Access Control Policy Tool

Access Control Policy Tool (ACPT) Project

Overview of this United States Project

Access control mechanisms control which users or processes have access to which resources in a system. Access control policies are increasingly specified to facilitate managing and maintaining access control. However, the correct specification of access control policies is a very challenging problem. This problem becomes increasingly severe as a system becomes more and more complex, and is deployed to manage a large amount of sensitive or private information and resources. To provide high security confidence levels for the nation’s critical IT infrastructure, it is important to provide a tool, which can thoroughly and automatically check the syntactic and semantic faults of AC policies before deploying them for operation.

National Institute of Standards and Technology effort of developing the tool – Access Control Policy Tool (ACPT) provides:

  • GUI templates for composing AC policies,
  • property checking for Access Control policy models through an SMV (Symbolic Model Verification) model checker,
  • complete test suite generated by National Institute of Standards and Technology’s combinatorial testing tool ACTS, and
  • XACML policy generation as output of verified model.

Through the four major functions, Access Control Policy Tool performs all the syntactic and semantic verifications as well as the interface for composing and combining AC rules for Access Control policies; Access Control Policy Tool assures the efficiency of specified AC policies, and eliminates the possibility of making faulty AC policies that leak the privacy information or prohibit legitimate information sharing. National Institute of Standards and Technology has developed this tool, because so far, there is no project or research similar to the Access Control Policy Tool.

The National Institute of Standards and Technology has significant experience and has great success in developing and transferring access control technologies. In regard to cyber security, privacy, and information sharing, access control is one of the crucial elements in protecting the nation’s critical IT infrastructures for healthcare, transportation, financial, power grids, military, intelligence, and safety systems, etc. It is essential to have measurement technology such as Access Control Policy Tool for access control policy administrators and authors to ensure the safety and flexibility in composing and combining their access control policies. Thus, the developing of Access Control Policy Tool meets the mission of the Computer Security Division, according to the Federal Information Security Management Act of 2002 (FISMA). Introduction of Access Control Policy Tool slides can be downloaded in the Reference Section below.

Access Control Policy Tool is currently available as a prototype system; it contains model templates for three major access control policies: static Attribute-Based access control, Multi-Leveled Security, and stated Work-Flow. New and improved features will be added for the future versions.

Further Reading

  • Gouglidis, A., Mavridis, I., & Hu, V. C., Security policy verification for multi-domains in cloud systems, Int’l Journal of Information Security (IJIS13), article No. 13(2), 97-111, July, 2014.
    Gouglidis, A., Mavridis, I., & Hu, V. C., Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems, IEEE Seventh International Conference on Software Security and Reliability (SERE 2013) Washington, D.C., USA, June, 2013.
  • V. Hu, D.R. Kuhn, T. Xie, J. Hwang, Model Checking for Verification of Mandatory Access Control Models and Properties, Int’l Journal of Software Engineering and Knowledge Engineering (published in IJSEKE journal, Vol. 21, No. 01, February 2011).
  • V. Hu, D.R. Kuhn, T. Xie, Property Verification for Generic Access Control Models, IEEE/IFIP International Symposium on Trust, Security, and Privacy for Pervasive Applications, Shanghai, China, Dec. 17-20, 2008.
  • J. Hwang, T. Xie, V. Hu, Detection of Multiple-Duty-Related Security Leakage in Access Control Policies,The Third IEEE international conference on Secure Software Integration and reliability improvement (SSIRI), Beijing China, July 8-10, 2009.
  • E. Martin, J. Hwang , T. Xie , and V. Hu, Assessing Quality of Policy Properties in Verification of Access Control Policies, Annual Computer Security Applications Conference (ACSAC), December, 2008.Anaheim, California.
  • V. Hu, E. Martin, T. Xie, Conformance Checking of Access Control Policies Specified in XACML, proceeding The First IEEE International Workshop on Security in Software Engineering (IWWSE), Beijing China, July 23-27, 2007.

Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *