DocumentCode :
1762324
Title :
Discovery and Resolution of Anomalies in Web Access Control Policies
Author :
Hongxin Hu ; Gail-Joon Ahn ; Kulkarni, Ketki
Author_Institution :
Dept. of Comput. & Inf. Sci., Delaware State Univ., Dover, DE, USA
Volume :
10
Issue :
6
fYear :
2013
fDate :
Nov.-Dec. 2013
Firstpage :
341
Lastpage :
354
Abstract :
Emerging computing technologies such as web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services while providing more convenient services to Internet users through such a cutting-edge technological growth. Furthermore, designing and managing web access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly analysis approach for web access control policies, focusing on extensible access control markup language policy. We introduce a policy-based segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions, along with an intuitive visualization representation of analysis results. We also discuss a proof-of-concept implementation of our method called XAnalyzer and demonstrate how our approach can efficiently discover and resolve policy anomalies.
Keywords :
Web services; authorisation; business data processing; cloud computing; data visualisation; service-oriented architecture; Web access control policies; Web services; XAnalyzer; analysis mechanisms; anomaly discovery; anomaly resolution; business services; cloud computing; cutting-edge technological growth; extensible access control markup language policy; policy anomaly analysis approach; policy-based segmentation technique; proof-of-concept implementation; service-oriented architecture; unauthorized actions; unintended security leakages; visualization representation; Access control; Algorithm design and analysis; Authorization; Boolean functions; Data structures; Knowledge discovery; Web services; Access control policies; XACML; conflict; discovery and resolution; redundancy;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2013.18
Filename :
6482139
Link To Document :
بازگشت