TY - GEN
T1 - Model-Driven integration and analysis of Access-control policies in Multi-layer information systems
AU - Martínez, Salvador
AU - Garcia-Alfaro, Joaquin
AU - Cuppens, Frédéric
AU - Cuppens-Boulahia, Nora
AU - Cabot, Jordi
N1 - Publisher Copyright:
© IFIP International Federation for Information Processing 2015.
PY - 2015/1/1
Y1 - 2015/1/1
N2 - Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to 1) achieve the global security goal and 2) facilitate the analysis of the security status of the whole system. For the specific case of access-control, access-control policies may be found in several components (databases, networks and applications) all, supposedly, working together in order to meet the high level security property. In this work we propose an integration mechanism for access-control policies to enable the analysis of the system security. We rely on model-driven technologies and the XACML standard to achieve this goal.
AB - Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to 1) achieve the global security goal and 2) facilitate the analysis of the security status of the whole system. For the specific case of access-control, access-control policies may be found in several components (databases, networks and applications) all, supposedly, working together in order to meet the high level security property. In this work we propose an integration mechanism for access-control policies to enable the analysis of the system security. We rely on model-driven technologies and the XACML standard to achieve this goal.
U2 - 10.1007/978-3-319-18467-8_15
DO - 10.1007/978-3-319-18467-8_15
M3 - Conference contribution
AN - SCOPUS:84942563951
SN - 9783319184661
T3 - IFIP Advances in Information and Communication Technology
SP - 218
EP - 233
BT - ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Proceedings
A2 - Federrath, Hannes
A2 - Gollmann, Dieter
PB - Springer New York LLC
T2 - 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015
Y2 - 26 May 2015 through 28 May 2015
ER -