Model-Driven integration and analysis of Access-control policies in Multi-layer information systems

Salvador Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to 1) achieve the global security goal and 2) facilitate the analysis of the security status of the whole system. For the specific case of access-control, access-control policies may be found in several components (databases, networks and applications) all, supposedly, working together in order to meet the high level security property. In this work we propose an integration mechanism for access-control policies to enable the analysis of the system security. We rely on model-driven technologies and the XACML standard to achieve this goal.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Proceedings
EditorsHannes Federrath, Dieter Gollmann
PublisherSpringer New York LLC
Pages218-233
Number of pages16
ISBN (Print)9783319184661
DOIs
Publication statusPublished - 1 Jan 2015
Event30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015 - Hamburg, Germany
Duration: 26 May 201528 May 2015

Publication series

NameIFIP Advances in Information and Communication Technology
Volume455
ISSN (Print)1868-4238

Conference

Conference30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015
Country/TerritoryGermany
CityHamburg
Period26/05/1528/05/15

Fingerprint

Dive into the research topics of 'Model-Driven integration and analysis of Access-control policies in Multi-layer information systems'. Together they form a unique fingerprint.

Cite this