loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Peter Amthor

Affiliation: Ilmenau University of Technology, Germany

Keyword(s): Security engineering, security policies, access control systems, access control models, safety, heuristic analysis, SELinux

Related Ontology Subjects/Areas/Topics: Access Control ; Data Engineering ; Databases and Data Security ; Formal Methods for Security ; Information and Systems Security ; Internet Technology ; Security and Privacy Policies ; Security Verification and Validation ; Web Information Systems and Technologies

Abstract: Being of paramount importance for the correctness of a security policy, the property of safety has received decades of attention in the field of model-based security engineering. To analyze the safety of a security model, heuristic approaches are used to avoid restrictions of the model calculus while accepting semi-decidability of this property. Within this field, this paper addresses three open problems concerning the DEPSEARCH heuristic safety analysis framework: Inefficient state-space exploration, static verification of unsafety-unsatisfiability, and parameter dependency analysis. We describe these problems on a formal basis, specify solution proposals, and implement these in the current, model-independent fDS framework. A practical evaluation based on SELinux is performed to study effectiveness and future optimization of the framework.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.189.178.34

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Amthor, P. (2017). Efficient Heuristic Safety Analysis of Core-based Security Policies. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT; ISBN 978-989-758-259-2; ISSN 2184-3236, SciTePress, pages 384-392. DOI: 10.5220/0006477103840392

@conference{secrypt17,
author={Peter Amthor.},
title={Efficient Heuristic Safety Analysis of Core-based Security Policies},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT},
year={2017},
pages={384-392},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006477103840392},
isbn={978-989-758-259-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - SECRYPT
TI - Efficient Heuristic Safety Analysis of Core-based Security Policies
SN - 978-989-758-259-2
IS - 2184-3236
AU - Amthor, P.
PY - 2017
SP - 384
EP - 392
DO - 10.5220/0006477103840392
PB - SciTePress