首页 > 最新文献

Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Mobile security and privacy: the quest for the mighty access control 移动安全和隐私:对强大访问控制的追求
A. Sadeghi
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end-users. Mobile applications (apps) provide flexible access to critical services such as online banking, health records, enterprise applications, or social networks. The increasing computing and storage capabilities, new interfaces such as near field communication technology (NFC) or integration of hardware-based secure execution environments as well as rich context sensing capabilities have turned these devices to enablers for many useful (and fancy) applications. In particular, we consider two emerging trends with high commercial interest: smart devices as access tokens (e.g., in conjunction with NFC), and smart devices as powerful sensors for context-aware access control to resources. We elaborate on the functional, security, and privacy challenges to realizing these applications in practice. To tackle these challenges (and depending on the underlying use-case) we clearly need security and privacy protecting measures at different system abstraction layers (applications, operating system, and hardware) and we may need them simultaneously. Although mobile operating systems have been designed with security in mind from their infancy, they fail to resist sophisticated attacks as shown recently. We observe diverse attack vectors from application-level privilege escalation attacks and sensory malware to runtime attacks that hijack the execution flow of apps, in particular the recently proposed just-in-time return-oriented programming attack technique which circumvents fine-grained address space layout randomization. Moreover, runtime attacks can be leveraged to compromise the underlying operating system through kernel based attacks (e.g., root exploits) allowing an attacker to get full control over the mobile device. In the recent years, researchers have presented many proposals to enhance the security and privacy at different abstraction layers with the strong focus on the Android operating system for obvious reasons (open-source and popularity). Investigating the large body of literature on Android security we observe that almost all proposals for security extensions to Android constitute mandatory access control (MAC) mechanisms that are tailored to the specific semantics of the addressed problem, for instance, establishing fine-grained access control to the user's private data or protecting the platform integrity. Moreover, these solutions consider protection mechanisms that operate only at a specific system abstraction layer, i.e., either at the middleware (and/or application) layer, or at the kernel-layer. In addition, security and privacy policy management itself would need to be made more context-aware and user-centric. We elaborate on security solutions (including our work) that aim to mitigate attacks at application-level including control flow integrity (CFI) against runtime attacks on mobile devices, and discuss their trade-offs. We then
移动智能设备正在改变我们的生活,是终端用户新兴的主要计算平台。移动应用程序(app)提供对关键服务的灵活访问,如网上银行、健康记录、企业应用程序或社交网络。不断增长的计算和存储能力、新接口(如近场通信技术(NFC))或基于硬件的安全执行环境集成以及丰富的上下文感知能力)使这些设备成为许多有用(和奇特)应用程序的推动者。特别是,我们考虑了两个具有高商业兴趣的新兴趋势:智能设备作为访问令牌(例如,与NFC结合使用),智能设备作为对资源进行上下文感知访问控制的强大传感器。我们详细阐述了在实践中实现这些应用程序所面临的功能、安全和隐私方面的挑战。为了应对这些挑战(并取决于底层用例),我们显然需要在不同的系统抽象层(应用程序、操作系统和硬件)上采取安全和隐私保护措施,我们可能同时需要它们。尽管移动操作系统在设计之初就考虑到了安全性,但正如最近所示,它们无法抵御复杂的攻击。我们观察到各种攻击向量,从应用程序级特权升级攻击和感知恶意软件到劫持应用程序执行流的运行时攻击,特别是最近提出的即时返回导向编程攻击技术,它绕过了细粒度地址空间布局随机化。此外,运行时攻击可以通过基于内核的攻击(例如,根漏洞利用)来危害底层操作系统,从而允许攻击者完全控制移动设备。近年来,研究人员提出了许多在不同抽象层增强安全性和隐私性的建议,其中重点关注Android操作系统,原因很明显(开源和流行)。调查大量关于Android安全的文献,我们发现几乎所有关于Android安全扩展的建议都包含强制访问控制(MAC)机制,这些机制是针对所解决问题的特定语义量身定制的,例如,建立对用户私有数据的细粒度访问控制或保护平台完整性。此外,这些解决方案考虑了仅在特定系统抽象层(即中间件(和/或应用程序)层或内核层)上运行的保护机制。此外,安全和隐私策略管理本身需要更加上下文感知和以用户为中心。我们详细阐述了旨在减轻应用级攻击的安全解决方案(包括我们的工作),包括针对移动设备运行时攻击的控制流完整性(CFI),并讨论了它们的权衡。然后,我们提出了一个通用的安全架构——受到Flask架构概念的启发——用于Android操作系统,它涵盖了内核层和中间件层的强制访问控制(MAC)。它旨在作为一个灵活有效的生态系统来实例化不同的安全解决方案。此外,它旨在实施基于感知和上下文的策略,例如,使用感知上下文及其安全相关属性,以真正的上下文感知方式动态授予和拒绝对设备资源的访问。然后我们讨论进一步的挑战,特别是在实践中部署最后但并非最不重要的是,我们留下的问题是,如何强大的访问控制机制应该在移动智能设备上有一个适当的和合理的权衡安全,隐私和可用性在实践中。
{"title":"Mobile security and privacy: the quest for the mighty access control","authors":"A. Sadeghi","doi":"10.1145/2462410.2463204","DOIUrl":"https://doi.org/10.1145/2462410.2463204","url":null,"abstract":"Mobile smart devices are changing our lives and are the emerging dominant computing platform for end-users. Mobile applications (apps) provide flexible access to critical services such as online banking, health records, enterprise applications, or social networks. The increasing computing and storage capabilities, new interfaces such as near field communication technology (NFC) or integration of hardware-based secure execution environments as well as rich context sensing capabilities have turned these devices to enablers for many useful (and fancy) applications. In particular, we consider two emerging trends with high commercial interest: smart devices as access tokens (e.g., in conjunction with NFC), and smart devices as powerful sensors for context-aware access control to resources. We elaborate on the functional, security, and privacy challenges to realizing these applications in practice. To tackle these challenges (and depending on the underlying use-case) we clearly need security and privacy protecting measures at different system abstraction layers (applications, operating system, and hardware) and we may need them simultaneously. Although mobile operating systems have been designed with security in mind from their infancy, they fail to resist sophisticated attacks as shown recently. We observe diverse attack vectors from application-level privilege escalation attacks and sensory malware to runtime attacks that hijack the execution flow of apps, in particular the recently proposed just-in-time return-oriented programming attack technique which circumvents fine-grained address space layout randomization. Moreover, runtime attacks can be leveraged to compromise the underlying operating system through kernel based attacks (e.g., root exploits) allowing an attacker to get full control over the mobile device.\u0000 In the recent years, researchers have presented many proposals to enhance the security and privacy at different abstraction layers with the strong focus on the Android operating system for obvious reasons (open-source and popularity). Investigating the large body of literature on Android security we observe that almost all proposals for security extensions to Android constitute mandatory access control (MAC) mechanisms that are tailored to the specific semantics of the addressed problem, for instance, establishing fine-grained access control to the user's private data or protecting the platform integrity.\u0000 Moreover, these solutions consider protection mechanisms that operate only at a specific system abstraction layer, i.e., either at the middleware (and/or application) layer, or at the kernel-layer. In addition, security and privacy policy management itself would need to be made more context-aware and user-centric.\u0000 We elaborate on security solutions (including our work) that aim to mitigate attacks at application-level including control flow integrity (CFI) against runtime attacks on mobile devices, and discuss their trade-offs. We then","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"40 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79535557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Specification and analysis of access control policies for mobile applications 移动应用访问控制策略的规范和分析
Ramadan Abdunabi, I. Ray, R. France
Mobile applications allow individuals on-the-move access to resources "anytime, anywhere" using hand-held mobile devices. We argue that for critical and sensitive resources this is often times not desirable -- a lost or stolen mobile device can be tampered with to view or alter sensitive information. We need authorization policies that take into account time of access and location of the user in addition to the credentials of the user. Towards this end, we propose a new spatio-temporal role-based access control model. It improves upon existing models by providing features that are useful for mobile applications. Thus, an application using our model can specify different types of spatio-temporal constraints. We discuss how such an application using our spatio-temporal access control model can be verified using the UPPAAL model checker. We also demonstrate how to reduce the state-space explosion problem that is inherent in model checkers.
移动应用程序允许移动中的个人使用手持移动设备“随时随地”访问资源。我们认为,对于关键和敏感的资源,这通常是不可取的——丢失或被盗的移动设备可以被篡改以查看或更改敏感信息。除了用户的凭据之外,我们还需要考虑访问时间和用户位置的授权策略。为此,我们提出了一种新的基于时空角色的访问控制模型。它通过提供对移动应用程序有用的功能来改进现有模型。因此,使用我们模型的应用程序可以指定不同类型的时空约束。我们将讨论如何使用UPPAAL模型检查器验证使用我们的时空访问控制模型的应用程序。我们还演示了如何减少模型检查器中固有的状态空间爆炸问题。
{"title":"Specification and analysis of access control policies for mobile applications","authors":"Ramadan Abdunabi, I. Ray, R. France","doi":"10.1145/2462410.2463206","DOIUrl":"https://doi.org/10.1145/2462410.2463206","url":null,"abstract":"Mobile applications allow individuals on-the-move access to resources \"anytime, anywhere\" using hand-held mobile devices. We argue that for critical and sensitive resources this is often times not desirable -- a lost or stolen mobile device can be tampered with to view or alter sensitive information. We need authorization policies that take into account time of access and location of the user in addition to the credentials of the user. Towards this end, we propose a new spatio-temporal role-based access control model. It improves upon existing models by providing features that are useful for mobile applications. Thus, an application using our model can specify different types of spatio-temporal constraints. We discuss how such an application using our spatio-temporal access control model can be verified using the UPPAAL model checker. We also demonstrate how to reduce the state-space explosion problem that is inherent in model checkers.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"39 1","pages":"173-184"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88181864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Sticky policies for mobile devices 移动设备粘接策略
Francesco Di Cerbo, S. Trabelsi, Thomas Steingruber, Gabriella Dodero, M. Bezzi
Mobile devices consume significant amounts of information, from different sources. Thus they often deal also with sensitive or confidential data, in places or situations that could be not appropriate, or not compliant with a corporate policy: context-aware access/usage control solutions can counter such situations. We propose a prototype, called ProtectMe, that exploits "Sticky Policies" (SP) that are attached to resources and prescribe usage conditions. Since mobile devices cannot foresee usage conditions of collected data, ProtectMe integrates SPs within any information consumable by mobile devices, and dynamically enforces their usage constraints. It assists users in attaching access and usage control conditions stated by resource-specific SPs, and it enforces them by making use of contextual information collected by mobile devices. The aim of the prototype is to show the feasibility of the SP approach, merging security functionalities within a concept for expressing SPs in a user-friendly manner.
移动设备消耗来自不同来源的大量信息。因此,它们还经常在可能不合适或不符合公司策略的位置或情况下处理敏感或机密数据:上下文感知访问/使用控制解决方案可以应对此类情况。我们提出了一个名为ProtectMe的原型,它利用了附加到资源并规定使用条件的“粘性策略”(SP)。由于移动设备无法预见所收集数据的使用情况,ProtectMe将sp集成到移动设备可消费的任何信息中,并动态地执行其使用约束。它帮助用户附加由资源特定的sp规定的访问和使用控制条件,并通过使用移动设备收集的上下文信息来执行这些条件。原型的目的是展示SP方法的可行性,在以用户友好的方式表示SP的概念中合并安全功能。
{"title":"Sticky policies for mobile devices","authors":"Francesco Di Cerbo, S. Trabelsi, Thomas Steingruber, Gabriella Dodero, M. Bezzi","doi":"10.1145/2462410.2462429","DOIUrl":"https://doi.org/10.1145/2462410.2462429","url":null,"abstract":"Mobile devices consume significant amounts of information, from different sources. Thus they often deal also with sensitive or confidential data, in places or situations that could be not appropriate, or not compliant with a corporate policy: context-aware access/usage control solutions can counter such situations. We propose a prototype, called ProtectMe, that exploits \"Sticky Policies\" (SP) that are attached to resources and prescribe usage conditions.\u0000 Since mobile devices cannot foresee usage conditions of collected data, ProtectMe integrates SPs within any information consumable by mobile devices, and dynamically enforces their usage constraints. It assists users in attaching access and usage control conditions stated by resource-specific SPs, and it enforces them by making use of contextual information collected by mobile devices.\u0000 The aim of the prototype is to show the feasibility of the SP approach, merging security functionalities within a concept for expressing SPs in a user-friendly manner.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"38 1","pages":"257-260"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85788745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Least-restrictive enforcement of the Chinese wall security policy 对中国隔离墙安全政策的执行限制最少
A. Sharifi, Mahesh V. Tripunitara
The Chinese Wall security policy states that information from objects that are to be confidential from one another should not flow to a subject. It addresses conflict of interest, and was first articulated in the well-cited work of Brewer and Nash, which proposes also an enforcement mechanism for the policy. Work subsequent to theirs has observed that their enforcement mechanism is overly restrictive -- authorization states in which the policy is not violated may be rendered unreachable. We present two sets of novel results in this context. In one, we present an enforcement mechanism for the policy that is simple and efficient, and least-restrictive -- an authorization state is reachable if and only if it does not violate the policy. In our enforcement mechanism, the actions of a subject can constrain the prospective actions of another, a trade-off that we show every enforcement mechanism that is least-restrictive must incur. Our other set of results is that the enforcement mechanism of Brewer-Nash is even more restrictive than previous work establishes. Specifically, we show: (1) what is called the *-rule is overspecified in that one of its sub-rules implies the other, and, (2) if a subject is authorized to write to an object that contains confidential information, then all objects that contain confidential information must belong to the same conflict of interest class. Our work sheds new light on what is generally considered to be important work in information security.
“中国墙”安全策略规定,对象之间的信息不应该流向对象。它解决了利益冲突,并在布鲁尔和纳什被广泛引用的著作中首次提出,该著作还提出了一种政策的执行机制。他们之后的工作已经观察到,他们的执行机制过于严格——没有违反策略的授权状态可能变得无法访问。在此背景下,我们提出了两组新颖的结果。在一种情况下,我们提出了一种简单有效且限制最少的策略实施机制——当且仅当授权状态不违反策略时,才可以访问该状态。在我们的执行机制中,一个主体的行为可以约束另一个主体的预期行为,我们展示了约束最少的每个执行机制必须产生的权衡。我们的另一组结果是,Brewer-Nash的执行机制比之前的研究建立的更具限制性。具体来说,我们表明:(1)所谓的*-规则是过度指定的,因为它的一个子规则暗示了另一个子规则,并且(2)如果一个主体被授权写入包含机密信息的对象,那么包含机密信息的所有对象必须属于相同的利益冲突类。我们的工作揭示了通常被认为是信息安全的重要工作。
{"title":"Least-restrictive enforcement of the Chinese wall security policy","authors":"A. Sharifi, Mahesh V. Tripunitara","doi":"10.1145/2462410.2462425","DOIUrl":"https://doi.org/10.1145/2462410.2462425","url":null,"abstract":"The Chinese Wall security policy states that information from objects that are to be confidential from one another should not flow to a subject. It addresses conflict of interest, and was first articulated in the well-cited work of Brewer and Nash, which proposes also an enforcement mechanism for the policy. Work subsequent to theirs has observed that their enforcement mechanism is overly restrictive -- authorization states in which the policy is not violated may be rendered unreachable. We present two sets of novel results in this context. In one, we present an enforcement mechanism for the policy that is simple and efficient, and least-restrictive -- an authorization state is reachable if and only if it does not violate the policy. In our enforcement mechanism, the actions of a subject can constrain the prospective actions of another, a trade-off that we show every enforcement mechanism that is least-restrictive must incur. Our other set of results is that the enforcement mechanism of Brewer-Nash is even more restrictive than previous work establishes. Specifically, we show: (1) what is called the *-rule is overspecified in that one of its sub-rules implies the other, and, (2) if a subject is authorized to write to an object that contains confidential information, then all objects that contain confidential information must belong to the same conflict of interest class. Our work sheds new light on what is generally considered to be important work in information security.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"55 1","pages":"61-72"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80200421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Combining social authentication and untrusted clouds for private location sharing 结合社会身份验证和不受信任的云进行私有位置共享
A. Adams, Adam J. Lee
Recently, many location-sharing services (LSSs) have emerged that share data collected using mobile devices. However, research has shown that many users are uncomfortable with LSS operators managing their location histories, and that the ease with which contextual data can be shared with unintended audiences can lead to regrets that sometimes outweigh the benefits of these systems. In an effort to address these issues, we have developed SLS: a secure location sharing system that combines location-limited channels, multi-channel key establishment, and untrusted cloud storage to hide user locations from LSS operators while also limiting unintended audience sharing. In addition to describing the key agreement and location-sharing protocols used by SLS, we discuss an iOS implementation of SLS that enables location sharing at tunable granularity through an intuitive policy interface on the user's mobile device.
最近,出现了许多位置共享服务(lss),它们共享使用移动设备收集的数据。然而,研究表明,许多用户对LSS运营商管理他们的位置历史感到不舒服,并且上下文数据可以轻松地与意想不到的受众共享,这可能会导致遗憾,有时超过这些系统的好处。为了解决这些问题,我们开发了SLS:一种安全的位置共享系统,它结合了位置限制通道、多通道密钥建立和不受信任的云存储,可以对LSS运营商隐藏用户位置,同时也限制了意外的受众共享。除了描述SLS使用的关键协议和位置共享协议之外,我们还讨论了SLS的iOS实现,该实现通过用户移动设备上的直观策略界面以可调粒度实现位置共享。
{"title":"Combining social authentication and untrusted clouds for private location sharing","authors":"A. Adams, Adam J. Lee","doi":"10.1145/2462410.2462421","DOIUrl":"https://doi.org/10.1145/2462410.2462421","url":null,"abstract":"Recently, many location-sharing services (LSSs) have emerged that share data collected using mobile devices. However, research has shown that many users are uncomfortable with LSS operators managing their location histories, and that the ease with which contextual data can be shared with unintended audiences can lead to regrets that sometimes outweigh the benefits of these systems. In an effort to address these issues, we have developed SLS: a secure location sharing system that combines location-limited channels, multi-channel key establishment, and untrusted cloud storage to hide user locations from LSS operators while also limiting unintended audience sharing. In addition to describing the key agreement and location-sharing protocols used by SLS, we discuss an iOS implementation of SLS that enables location sharing at tunable granularity through an intuitive policy interface on the user's mobile device.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"11 1","pages":"15-24"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82525499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Searching over encrypted data in cloud systems 搜索云系统中的加密数据
F. Kerschbaum
Security is still a major inhibitor of cloud computing. When companies are testing cloud applications, e.g. for storage or databases, they use generated data for fear of data loss. Modern encrypted databases where the cryptographic key remains at the client provide a solution to this problem. Recent results in cryptography, such order-preserving encryption, and database systems enable the practical use of these systems. We report on our pre-development efforts of implementing such an encrypted database in an in-memory, column store database. We highlight some unsolved research challenges: such as access control, infrequent queries and security vs. performance query optimization. Challenges to key management in multi-user environments remain largely unsolved. We give an overview of the architecture and performance benchmarks on our prototype which are very encouraging for practical adoption.
安全性仍然是云计算的主要障碍。当公司测试云应用程序时,例如存储或数据库,他们使用生成的数据,因为担心数据丢失。加密密钥保存在客户端的现代加密数据库为这个问题提供了解决方案。密码学(例如保序加密)和数据库系统的最新成果使这些系统能够实际使用。我们将报告在内存中列存储数据库中实现这种加密数据库的开发前工作。我们强调了一些尚未解决的研究挑战:如访问控制、不频繁查询和安全性与性能查询优化。多用户环境中密钥管理的挑战在很大程度上仍未得到解决。我们概述了我们的原型的架构和性能基准,这对实际采用非常鼓舞人心。
{"title":"Searching over encrypted data in cloud systems","authors":"F. Kerschbaum","doi":"10.1145/2462410.2462888","DOIUrl":"https://doi.org/10.1145/2462410.2462888","url":null,"abstract":"Security is still a major inhibitor of cloud computing. When companies are testing cloud applications, e.g. for storage or databases, they use generated data for fear of data loss. Modern encrypted databases where the cryptographic key remains at the client provide a solution to this problem. Recent results in cryptography, such order-preserving encryption, and database systems enable the practical use of these systems. We report on our pre-development efforts of implementing such an encrypted database in an in-memory, column store database. We highlight some unsolved research challenges: such as access control, infrequent queries and security vs. performance query optimization. Challenges to key management in multi-user environments remain largely unsolved. We give an overview of the architecture and performance benchmarks on our prototype which are very encouraging for practical adoption.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"18 1","pages":"87-88"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86473586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Content-based information protection and release in NATO operations 北约行动中基于内容的信息保护和发布
A. Armando, Matteo Grasso, S. Oudkerk, Silvio Ranise, K. Wrona
The successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted users. To resolve the conflict between confidentiality and availability, NATO is developing a new information sharing infrastructure, called Content-based Protection and Release. We describe the architecture of access control in NATO operations, which is designed to be easily built on top of available (service-oriented) infrastructures for identity and access control management. We then present a use case scenario drawn from the NATO Passive Missile Defence system for simulating the consequences of intercepting missile attacks. In the system demonstration, we show how maps annotated with the findings of the system are filtered by the access control module to produce appropriate views for users with different clearances and terminals under given release and protection policies.
北约任务的成功运作需要在联盟伙伴和外部组织之间有效和安全地共享信息,同时避免向不受信任的用户泄露敏感信息。为了解决机密性和可用性之间的冲突,北约正在开发一种新的信息共享基础设施,称为基于内容的保护和发布。我们描述了北约行动中的访问控制体系结构,该体系结构被设计为易于构建在可用的(面向服务的)基础设施之上,用于身份和访问控制管理。然后,我们提出了一个来自北约被动导弹防御系统的用例场景,用于模拟拦截导弹攻击的后果。在系统演示中,我们展示了访问控制模块如何过滤带有系统结果注释的地图,以便在给定的释放和保护策略下为具有不同权限和终端的用户生成适当的视图。
{"title":"Content-based information protection and release in NATO operations","authors":"A. Armando, Matteo Grasso, S. Oudkerk, Silvio Ranise, K. Wrona","doi":"10.1145/2462410.2462427","DOIUrl":"https://doi.org/10.1145/2462410.2462427","url":null,"abstract":"The successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted users. To resolve the conflict between confidentiality and availability, NATO is developing a new information sharing infrastructure, called Content-based Protection and Release. We describe the architecture of access control in NATO operations, which is designed to be easily built on top of available (service-oriented) infrastructures for identity and access control management. We then present a use case scenario drawn from the NATO Passive Missile Defence system for simulating the consequences of intercepting missile attacks. In the system demonstration, we show how maps annotated with the findings of the system are filtered by the access control module to produce appropriate views for users with different clearances and terminals under given release and protection policies.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"55 1","pages":"261-264"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89956988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An information flow control meta-model 信息流控制元模型
D. Kafura, D. Gračanin
In this paper a meta-model for information flow control is defined using the foundation of Barker's access control meta-model. The purposes for defining this meta-model is to achieve a more principled understanding of information flow control, to compare information flow control and access control at an abstract level, and to explore how information flow control and access control might be composed to yield a rich new set of ideas and systems for controlling the dissemination of sensitive information. It is shown that it is possible to define a meta-model for information flow control, that such a model is more complex compared to the access control meta-model, and that the meta-models for information flow control and access control can be composed in a conceptually straightforward way.
本文在Barker访问控制元模型的基础上,定义了信息流控制元模型。定义这个元模型的目的是为了对信息流控制有一个更有原则性的理解,在抽象层面上比较信息流控制和访问控制,并探索如何将信息流控制和访问控制组合起来,以产生一套丰富的新的思想和系统来控制敏感信息的传播。研究表明,为信息流控制定义元模型是可能的,这种模型比访问控制元模型更复杂,并且信息流控制和访问控制的元模型可以以概念上直接的方式组合。
{"title":"An information flow control meta-model","authors":"D. Kafura, D. Gračanin","doi":"10.1145/2462410.2462414","DOIUrl":"https://doi.org/10.1145/2462410.2462414","url":null,"abstract":"In this paper a meta-model for information flow control is defined using the foundation of Barker's access control meta-model. The purposes for defining this meta-model is to achieve a more principled understanding of information flow control, to compare information flow control and access control at an abstract level, and to explore how information flow control and access control might be composed to yield a rich new set of ideas and systems for controlling the dissemination of sensitive information. It is shown that it is possible to define a meta-model for information flow control, that such a model is more complex compared to the access control meta-model, and that the meta-models for information flow control and access control can be composed in a conceptually straightforward way.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"24 1","pages":"101-112"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75441156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
RMiner: a tool set for role mining RMiner:用于角色挖掘的工具集
Ruixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, X. Gu
Recently, there are many approaches proposed for mining roles using automated technologies. However, it lacks a tool set that can be used to aid the application of role mining approaches and update role states. In this demonstration, we introduce a tool set, RMiner, which is based on the core of WEKA, an open source data mining tool. RMiner implements most of the classic and latest role mining algorithms and provides interactive tools for administrator to update role states. The running examples of RMiner are presented to demonstrate the effectiveness of the tool set.
最近,提出了许多使用自动化技术挖掘角色的方法。然而,它缺乏一个工具集,可以用来帮助应用角色挖掘方法和更新角色状态。在本演示中,我们将介绍一个工具集RMiner,它基于开源数据挖掘工具WEKA的核心。RMiner实现了大多数经典和最新的角色挖掘算法,并为管理员提供了更新角色状态的交互式工具。本文给出了RMiner的运行示例,以演示该工具集的有效性。
{"title":"RMiner: a tool set for role mining","authors":"Ruixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, X. Gu","doi":"10.1145/2462410.2462431","DOIUrl":"https://doi.org/10.1145/2462410.2462431","url":null,"abstract":"Recently, there are many approaches proposed for mining roles using automated technologies. However, it lacks a tool set that can be used to aid the application of role mining approaches and update role states. In this demonstration, we introduce a tool set, RMiner, which is based on the core of WEKA, an open source data mining tool. RMiner implements most of the classic and latest role mining algorithms and provides interactive tools for administrator to update role states. The running examples of RMiner are presented to demonstrate the effectiveness of the tool set.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"6 1","pages":"193-196"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76262528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Permission path analysis based on access intelligence 基于访问智能的权限路径分析
D. Sturm, A. Kern
The current Idintity and Access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented Access Governance. IdM focuses more on providing a single point of administration and provisioning users with the needed access rights. In contrast, Access Governance concentrates on integrating business departments in the assignment and controlling of access rights in the organisation. It therefore provides functions like access request and approval workflows and access certification processes. In addition, the demand to analyse access right structures to cover compliance requirements increases. We therefore use a business intelligence (BI) based approach to complement the current IAM landscape with comprehensive and powerful analysis capabilities. We see the following additional values in providing a separate Access Intelligence system: Using a BI system allows us to convert the access data into a format which allows flexible and fast analytics. We can fulfil the demand of many organisations to separate their operative access control systems and the analytics system. Using the well-known capabilities of a BI system, new analyses are provided. One example is the permission path analysis. It divides complex access structures into single paths and thereby lays the foundation for effective access right analyses. In this paper we present the permission path analysis and describe two evaluations based on it.
当前的身份和访问管理(IAM)主要由经典的身份管理(IdM)和面向业务的访问治理组成。IdM更侧重于提供单点管理并为用户提供所需的访问权限。相比之下,访问治理集中于将业务部门集成到组织中的访问权限分配和控制中。因此,它提供了访问请求和批准工作流以及访问认证流程等功能。此外,分析访问权限结构以涵盖合规要求的需求也在增加。因此,我们使用基于商业智能(BI)的方法,以全面而强大的分析能力补充当前的IAM环境。在提供单独的访问智能系统中,我们看到了以下附加价值:使用BI系统允许我们将访问数据转换为允许灵活快速分析的格式。我们可以满足许多机构将其操作访问控制系统和分析系统分开的需求。利用BI系统众所周知的功能,提供了新的分析。权限路径分析就是一个例子。它将复杂的访问结构划分为单个路径,从而为有效的访问权限分析奠定了基础。本文提出了权限路径分析,并在此基础上描述了两种评估方法。
{"title":"Permission path analysis based on access intelligence","authors":"D. Sturm, A. Kern","doi":"10.1145/2462410.2462432","DOIUrl":"https://doi.org/10.1145/2462410.2462432","url":null,"abstract":"The current Idintity and Access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented Access Governance. IdM focuses more on providing a single point of administration and provisioning users with the needed access rights. In contrast, Access Governance concentrates on integrating business departments in the assignment and controlling of access rights in the organisation. It therefore provides functions like access request and approval workflows and access certification processes. In addition, the demand to analyse access right structures to cover compliance requirements increases. We therefore use a business intelligence (BI) based approach to complement the current IAM landscape with comprehensive and powerful analysis capabilities. We see the following additional values in providing a separate Access Intelligence system: Using a BI system allows us to convert the access data into a format which allows flexible and fast analytics. We can fulfil the demand of many organisations to separate their operative access control systems and the analytics system.\u0000 Using the well-known capabilities of a BI system, new analyses are provided. One example is the permission path analysis. It divides complex access structures into single paths and thereby lays the foundation for effective access right analyses. In this paper we present the permission path analysis and describe two evaluations based on it.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"24 1","pages":"253-256"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87641766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1