Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Chung Tong Hu; Evan Martin; Tao Xie;|
|Title:||Conformance Checking of Access Control Policies Specified in XACML|
|Published:||July 24, 2007|
|Abstract:||Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to which resources in a system. To facilitate managing and maintaining access control, access control policies are increasingly written in specification languages such as XACML. The specification of access control policies itself is often a challenging problem. Furthermore, XACML is intentionally designed to be generic: it provides the freedom in describing access control policies, which are well-known or invented ones. But the flexibility and expressiveness provided by XACML come at the cost of complexity, verbosity, and lack of desirable-property enforcement. Often common properties for specific access control policies may not be satisfied when these policies are specified in XACML, causing the discrepancy between what the policy authors intend to specify and what the actually specified XACML policies reflect. In this position paper, we propose an approach for conducting conformance checking of access control policies specified in XACML based on existing verification and testing tools for XACML policies.|
|Conference:||First IEEE International Workshop on Security in Software Engineering (IWSSE)|
|Pages:||pp. 275 - 280|
|Keywords:||access control,access control policy,grid computing,trust domain|
|PDF version:||Click here to retrieve PDF version of paper (111KB)|