Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

A data classification method for inconsistency and incompleteness detection in access control policy sets

RA Shaikh, K Adi, L Logrippo - International Journal of Information …, 2017 - Springer
Access control policies may contain anomalies such as incompleteness and inconsistency,
which can result in security vulnerabilities. Detecting such anomalies in large sets of …

Formal analysis of XACML policies using SMT

F Turkmen, J den Hartog, S Ranise, N Zannone - Computers & Security, 2017 - Elsevier
Abstract The eXtensible Access Control Markup Language (XACML) has attracted
significant attention from both industry and academia, and has become the de facto standard …

Formal correctness of conflict detection for firewalls

V Capretta, B Stepien, A Felty, S Matwin - … of the 2007 ACM workshop on …, 2007 - dl.acm.org
We describe the formalization of a correctness proof for a conflict detection algorithm for
firewalls in the Coq Proof Assistant. First, we give formal definitions in Coq of a firewall …

Profact: A provenance-based analytics framework for access control policies

AA Jabal, M Davari, E Bertino, C Makaya… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Policy-based access control systems are crucial for secure information sharing in
collaborative applications. However, policy management needs to be flexible in order to …

Flap-a federated learning framework for attribute-based access control policies

A Abu Jabal, E Bertino, J Lobo, D Verma… - Proceedings of the …, 2023 - dl.acm.org
Technology advances in areas such as sensors, IoT, and robotics, enable new collaborative
applications (eg, autonomous devices). A primary requirement for such collaborations is to …

Sophisticated access control via SMT and logical frameworks

K Arkoudas, R Chadha, J Chiang - ACM Transactions on Information and …, 2014 - dl.acm.org
We introduce a new methodology for formulating, analyzing, and applying access-control
policies. Policies are expressed as formal theories in the SMT (satisfiability-modulo-theories) …

[PDF][PDF] Analysis and comparison of access control policies validation mechanisms

M Aqib, RA Shaikh - International Journal of Computer Network and …, 2015 - academia.edu
Validation and verification of security policies is a critical and important task to ensure that
access control policies are error free. The two most common problems present in access …

A policy framework for subject-driven data sharing

MJM Chowdhury, A Colman, J Han, MA Kabir - 2018 - aisel.aisnet.org
Organizations (eg, hospitals, university etc.) are custodians of data on their clients and use
this information to improve their service. Personal data of an individual therefore ends up …

Prefetch of attributes in evaluating access control requests

AD Brucker, H Petritsch - US Patent 9,256,757, 2016 - Google Patents
In an embodiment, a method is provided for prefetching attributes used in access control
evaluation. In this method, an access control policy that comprises rules is retrieved. These …