As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
Access control validation (also called conformity or compliance) consists in verifying at a regular basis whether the implemented access control rules are consistent and complete with respect to a given security policy or not. The compliance of some critical accesses needs to be monthly confirmed while other less critical assesses might me yearly analyzed. The result of the analysis is a detailed report that could be shown to an inspector. All important security referentials such as ISO 27001, COBIT, NIST 800-53 and HIPA recommend that conformity analysis should be done at regular intervals. For a small company, it would be possible to manually validate the access control policy. However for companies with thousands of employees, we need the help of automatic tools to accomplish this task.
This paper introduces AVTAR (Automatic Validation Tool of Access Control) which is a framework that can automatically extract access control policies in Windows and Linux operating systems in order to analyze them.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.