Analysis of XACML policies with SMT
Abstract The eXtensible Access Control Markup Language (XACML) is an extensible and
flexible XML language for the specification of access control policies. However, the richness …
flexible XML language for the specification of access control policies. However, the richness …
Formal analysis of XACML policies using SMT
Abstract The eXtensible Access Control Markup Language (XACML) has attracted
significant attention from both industry and academia, and has become the de facto standard …
significant attention from both industry and academia, and has become the de facto standard …
A rigorous framework for specification, analysis and enforcement of access control policies
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …
They are defined in terms of access control policies regulating the access to system …
[HTML][HTML] The logic of XACML
We study the international standard XACML 3.0 for describing security access control
policies in a compositional way. Our main contributions are (i) to derive a logic that precisely …
policies in a compositional way. Our main contributions are (i) to derive a logic that precisely …
Monitoring compliance policies over incomplete and disagreeing logs
When monitoring system behavior to check compliance against a given policy, one is
sometimes confronted with incomplete knowledge about system events. In IT systems, such …
sometimes confronted with incomplete knowledge about system events. In IT systems, such …
120 Domain-Specific Languages for Security
Security engineering, from security requirements engineering to the implementation of
cryptographic protocols, is often supported by domain-specific languages (DSLs) …
cryptographic protocols, is often supported by domain-specific languages (DSLs) …
JACPoL: a simple but expressive JSON-based access control policy language
H Jiang, A Bouabdallah - Information Security Theory and Practice: 11th …, 2018 - Springer
Along with the rapid development of ICT technologies, new areas like Industry 4.0, IoT and
5G have emerged and brought out the need for protecting shared resources and services …
5G have emerged and brought out the need for protecting shared resources and services …
Analyzing XACML policies using answer set programming
With the tremendous growth of Web applications and services, eXtensible Access Control
Markup Language (XACML) has been broadly adopted to specify Web access control …
Markup Language (XACML) has been broadly adopted to specify Web access control …
Sophisticated access control via SMT and logical frameworks
K Arkoudas, R Chadha, J Chiang - ACM Transactions on Information and …, 2014 - dl.acm.org
We introduce a new methodology for formulating, analyzing, and applying access-control
policies. Policies are expressed as formal theories in the SMT (satisfiability-modulo-theories) …
policies. Policies are expressed as formal theories in the SMT (satisfiability-modulo-theories) …
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules
Using access control policy rules with deny effects (ie, negative authorization) can be
preferred to using complemented conditions in the rules as they are often easier to …
preferred to using complemented conditions in the rules as they are often easier to …