Lightweight analysis of access control models with description logic

Christiano Braga1, Edward Hermann Hæusler2
1Instituto de Computação, Universidade Federal Fluminense, Niterói, Brazil
2Departamento de Informática, Pontificia Universidade Católica do Rio de Janeiro, Rio de Janeiro, Brazil

Tóm tắt

This paper presents a lightweight analysis approach to access control policies based on description logic ( $${\mathcal{DL}}$$ ). After recalling the model-driven security (MDS) approach for the specification and lightweight analysis of role-based security policies using the SecureUML modeling language, we describe how such policies may be specified in $${\mathcal{DL}}$$ and analyzed using $${\mathcal{DL}}$$ tools. We conclude with a comparison between the MDS and $${\mathcal{DL}}$$ -based approaches to the analysis of role-based access control security policies.

Từ khóa


Tài liệu tham khảo

Baader F, Diego Calvanese DM, Nardi D, Patel-Schneider P (2003) The description logic handbook. Cambridge University Press, London

Basin D, Clavel M, Doser J, Egea M (2009) Automated analysis of security-design models. Inf Softw Technol 51(5): 815–831. doi:10.1016/j.infsof.2008.05.011

Basin DA, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1):39–91 http://doi.acm.org/10.1145/1125808.1125810

Berardi D, Calvanese D, Giacomo GD (2005) Reasoning on UML class diagrams. Artificial Intelligence 168: 70–118. doi:10.1016/j.artint.2005.05.003

Braga C (2008) From access control policies to aspect code: a metamodel-based approach. In: Chaudron MRV (eds) Proceedings of the 11th international conference on model driven engineering languages and systems (MODELS 2008). Workshops and Symposia at MODELS 2008, 28 Sept–3 Oct 2008, Toulouse, France. Lecture notes on computer science, vol 5421. Springer, Berlin, pp 243–256. doi:10.1007/978-3-642-01648-6_26

Brucker AD, Doser J, Wolff B (2006) A model transformation semantics and analysis methodology for Secure UML. In: Nierstrasz O, Whittle J, Harel D, Reggio G (eds) Proceedings of the 9th international conference on model driven engineering languages and systems, Genova, Italy, 1–6 Oct. Lecture notes on computer science, vol 4199. Springer, Berlin, pp 306–320

Chae JH, Shiri N (2007) Description logic framework for access control and security in object-oriented systems. In: RSFDGrC ’07. Proceedings of the 11th international conference on rough sets, fuzzy sets, data mining and granular computing. Springer, Berlin, pp 565–573. doi:10.1007/978-3-540-72530-5_68

Clavel M, de Dios MAG, Egea M (2008) ArgoESS. http://maude.sip.ucm.es/eos

Clavel M, da Silva V, Braga C, Egea M (2008) Model-driven security in practice: an industrial experience. In: Proceedings of ECMDA 2008. Fourth European conference on model driven architecture, foundations and applications, Berlin, Germany. Lecture notes on computer science, 9–12 June, vol 5095. Springer, Berlin. doi:10.1007/978-3-540-69100-6_22

Clavel M, Egea M, de Dios MAG (2009) Checking unsatisfiability for OCL constraints. In: Proceedings of 9th OCL 2009 workshop at the UML/MoDELS conferences: the pragmatics Of OCL and other textual specification languages (accepted for publication)

Faghih F, Amini M, Jalili R (2009) A temporal description logic based access control model for expressing history constrained policies in semantic web. Policies for distributed systems and networks. In: IEEE International Workshop on 0:142–149. http://doi.ieeecomputersociety.org/10.1109/POLICY.2009.15

Ferraiolo DF, Kuhn DR, Chandramouli R (2007) Role-based access control, 2nd edn. Artech House Publishers, Norwood, MA, USA

Goldblatt R (1987) Logics of time and computation, 2nd edn. In: CSLI Lecture Notes, vol 7. Center for the Study of Language and Information

Juerjens J (2003) Secure systems development with UML. Springer, Berlin

Shields B, Molloy O (2007) Using description logic and rules to determine xml access control. In: DEXA ’07. Proceedings of the 18th international conference on database and expert systems applications. IEEE Computer Society, Washington, DC, USA, pp 718–724. doi:10.1109/DEXA.2007.147

Warmer J, Kleppe A (2003) The Object constraint language, 2nd edn. Addison-Wesley, Reading