Show simple item record

dc.identifier.urihttp://hdl.handle.net/1951/59677
dc.identifier.urihttp://hdl.handle.net/11401/71248
dc.description.sponsorshipThis work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree.en_US
dc.formatMonograph
dc.format.mediumElectronic Resourceen_US
dc.language.isoen_US
dc.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dc.typeDissertation
dcterms.abstractThe scale and complexity of security policies in enterprise systems makes it difficult to ensure that they achieve higher-level security goals. This dissertation explores two important ways in which policy analysis can help: reachability analysis for administrative policies, and analysis of policy enforcement in enterprise systems. An administrative policy specifies how each user in an enterprise may change the policy. Fully understanding the consequences of an administrative policy can be difficult, because sequences of changes by different users may interact in unexpected ways. Administrative policy analysis helps by answering questions such as user-permission reachability, which asks whether specified users can together change the policy in a way that achieves a specified goal, namely, granting a specified permission to a specified user. This dissertation presents a rule-based access control policy language, a rule-based administrative policy model that controls addition and removal of rules and facts, and an abductive analysis algorithm for user-permission reachability. Abductive analysis means that the algorithm can analyze policy rules even if the facts initially in the policy (e.g., information about users) are unavailable. The algorithm does this by computing minimal sets of facts that, if present in the initial policy, imply reachability of the goal. Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies, but are not enforced by a single mechanism that directly interprets such policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request's path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, database access control, and application-level access control. This dissertation presents a framework for expressing high-level policies, a method for verifying that a high-level policy is enforced, and an algorithm for determining a trusted computing base for each resource.
dcterms.available2013-05-22T17:34:41Z
dcterms.available2015-04-24T14:46:40Z
dcterms.contributorSekar, Ren_US
dcterms.contributorStoller, Scott Den_US
dcterms.contributorRamakrishnan, C Ren_US
dcterms.contributorLobo, Jorge.en_US
dcterms.creatorGupta, Puneet
dcterms.dateAccepted2013-05-22T17:34:41Z
dcterms.dateAccepted2015-04-24T14:46:40Z
dcterms.dateSubmitted2013-05-22T17:34:41Z
dcterms.dateSubmitted2015-04-24T14:46:40Z
dcterms.descriptionDepartment of Computer Scienceen_US
dcterms.extent120 pg.en_US
dcterms.formatApplication/PDFen_US
dcterms.formatMonograph
dcterms.identifierGupta_grad.sunysb_0771E_10808en_US
dcterms.identifierhttp://hdl.handle.net/1951/59677
dcterms.identifierhttp://hdl.handle.net/11401/71248
dcterms.issued2011-12-01
dcterms.languageen_US
dcterms.provenanceMade available in DSpace on 2013-05-22T17:34:41Z (GMT). No. of bitstreams: 1 Gupta_grad.sunysb_0771E_10808.pdf: 1000985 bytes, checksum: 357eee86cc55bf1ee72ceae8e8946a47 (MD5) Previous issue date: 1en
dcterms.provenanceMade available in DSpace on 2015-04-24T14:46:40Z (GMT). No. of bitstreams: 3 Gupta_grad.sunysb_0771E_10808.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5) Gupta_grad.sunysb_0771E_10808.pdf.txt: 232433 bytes, checksum: d584c5f2fd413288a5f9a41d1fc9cca7 (MD5) Gupta_grad.sunysb_0771E_10808.pdf: 1000985 bytes, checksum: 357eee86cc55bf1ee72ceae8e8946a47 (MD5) Previous issue date: 1en
dcterms.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dcterms.subjectComputer science
dcterms.subjectaccess control, policy administration, security policy, verification
dcterms.titleVerification of Security Policy Administration and Enforcement in Enterprise Systems
dcterms.typeDissertation


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record