loading
Papers

Research.Publish.Connect.

Paper

Author: Peter Amthor

Affiliation: Ilmenau University of Technology, Germany

ISBN: 978-989-758-259-2

Keyword(s): Security engineering, security policies, access control systems, access control models, safety, heuristic analysis, SELinux

Related Ontology Subjects/Areas/Topics: Access Control ; Data Engineering ; Databases and Data Security ; Formal Methods for Security ; Information and Systems Security ; Internet Technology ; Security and Privacy Policies ; Security Verification and Validation ; Web Information Systems and Technologies

Abstract: Being of paramount importance for the correctness of a security policy, the property of safety has received decades of attention in the field of model-based security engineering. To analyze the safety of a security model, heuristic approaches are used to avoid restrictions of the model calculus while accepting semi-decidability of this property. Within this field, this paper addresses three open problems concerning the DEPSEARCH heuristic safety analysis framework: Inefficient state-space exploration, static verification of unsafety-unsatisfiability, and parameter dependency analysis. We describe these problems on a formal basis, specify solution proposals, and implement these in the current, model-independent fDS framework. A practical evaluation based on SELinux is performed to study effectiveness and future optimization of the framework.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.210.22.132

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Amthor, P. (2017). Efficient Heuristic Safety Analysis of Core-based Security Policies.In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 384-392. DOI: 10.5220/0006477103840392

@conference{secrypt17,
author={Peter Amthor.},
title={Efficient Heuristic Safety Analysis of Core-based Security Policies},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)},
year={2017},
pages={384-392},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006477103840392},
isbn={978-989-758-259-2},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)
TI - Efficient Heuristic Safety Analysis of Core-based Security Policies
SN - 978-989-758-259-2
AU - Amthor, P.
PY - 2017
SP - 384
EP - 392
DO - 10.5220/0006477103840392

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.