30 results on '"access-control"'
Search Results
2. Protection of Bio-resources and Associated Knowledge against Bio-Piracy: A Critical Appraisal of Access-Control Mechanism in Biodiversity Management
- Author
-
Dash, Parimita, Mondal, Debmita, Striełkowski, Wadim, Editor-in-Chief, Black, Jessica M., Series Editor, Butterfield, Stephen A., Series Editor, Chang, Chi-Cheng, Series Editor, Cheng, Jiuqing, Series Editor, Dumanig, Francisco Perlas, Series Editor, Al-Mabuk, Radhi, Series Editor, Scheper-Hughes, Nancy, Series Editor, Urban, Mathias, Series Editor, Webb, Stephen, Series Editor, Pradhan, Tulishree, editor, Galla, Amareswar, editor, Stoicheva, Maria, editor, and Pandey, Amitabh, editor
- Published
- 2024
- Full Text
- View/download PDF
3. Securi-Chain: Enhancing Smart Contract Security in Blockchain Systems Through Optimized Access Control.
- Author
-
Swart, Keanu, Baror, Stacey Omeleze, and Venter, Hein
- Abstract
With the increase in usage of blockchain technology across domains, there is a high demand for the need of secure access control and a high level of security for smart contracts within blockchain to accommodate the domains that already implement blockchain and become accessible to other domains that require a high level of security in its transactions. This paper aims to evaluate the relationship between the best practices of access control and security of smart contracts in blockchain to optimise the usage of both technologies for blockchain usage across domains into a generalized blockchain model named the Securi-Chain Model. A literature review compares the relationship between access control and the security of smart contracts across three domains: Healthcare, IoT, and e-voting. Based on the findings of the literature review, Securi-Chain is proposed to implement the best practices displayed in these three domains and combine them in a way that ensures secure transactions across blockchain as a generalized approach that can be used throughout various domains. This model will also implement methods that enhance the security of transaction processes within the system. A Case Scenario is used to implement the Securi-Chain Model for the Healthcare and e-voting domains to display how this proposed model is used for domains that have been researched. The research that is conducted found that blockchain networks can support not only high-level access control across transactions in a network but also the security of smart contracts that comply to safeguard confidentiality, integrity, and data accessibility. Secrui-Chain, as well as the findings of the literature review, seem to benefit the domains that have been researched, as well as domains that require a high level of security regarding transactions across a network. These domains can benefit from using blockchain technology as well as the level of security that comes with the access control and security of smart contracts that have been implemented in Securi-Chain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Modeling and enforcing access control policies in conversational user interfaces.
- Author
-
Planas, Elena, Martínez, Salvador, Brambilla, Marco, and Cabot, Jordi
- Subjects
- *
USER interfaces , *ACCESS control , *ARTIFICIAL intelligence , *SYSTEMS software , *CHATBOTS - Abstract
Conversational user interfaces (CUIs), such as chatbots, are becoming a common component of many software systems. Although they are evolving in many directions (such as advanced language processing features, thanks to new AI-based developments), less attention has been paid to access control and other security concerns associated with CUIs, which may pose a clear risk to the systems they interface with. In this paper, we apply model-driven techniques to model and enforce access-control policies in CUIs. In particular, we present a fully fledged framework to integrate the role-based access-control (RBAC) protocol into CUIs by: (1) modeling a set of access-control rules to specify permissions over the bot resources using a domain-specific language that tailors core RBAC concepts to the CUI domain; and (2) describing a mechanism to show the feasibility of automatically generating the infrastructure to evaluate and enforce the modeled access control policies at runtime. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. AuthCheck: Program-State Analysis for Access-Control Vulnerabilities
- Author
-
Piskachev, Goran, Petrasch, Tobias, Späth, Johannes, Bodden, Eric, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Sekerinski, Emil, editor, Moreira, Nelma, editor, Oliveira, José N., editor, Ratiu, Daniel, editor, Guidotti, Riccardo, editor, Farrell, Marie, editor, Luckcuck, Matt, editor, Marmsoler, Diego, editor, Campos, José, editor, Astarte, Troy, editor, Gonnord, Laure, editor, Cerone, Antonio, editor, Couto, Luis, editor, Dongol, Brijesh, editor, Kutrib, Martin, editor, Monteiro, Pedro, editor, and Delmas, David, editor
- Published
- 2020
- Full Text
- View/download PDF
6. Achieving resource-centric access control for web-app interactions on android
- Author
-
Xin Zhang and Yifan Zhang
- Subjects
Web-app interaction ,Access-control ,Android ,Binder replacement ,ART hooking ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The capability of interacting with web content has become increasingly common among mobile apps. While web-app interaction can facilitate many new functionalities and improve app user experience, they also cause various notable security attacks on mobile apps or web content. The root cause is lack of proper access control mechanisms for web-app interactions on mobile OSes. Existing solutions usually adopt either an origin-centric design or a code-centric deign, and suffer from one or several of the following limitations: coarse protection granularity, poor flexibility in terms of access control policy establishment, and incompatibility with existing apps/OSes due to the need of modifying the apps and/or the underlying OS. More importantly, none of the existing works can organically deal with all the five web-app interaction mechanisms. In this paper, we first identify and survey five mechanisms through which web content interacts with mobile apps. We then propose ReACt, a novel Resource-centric Access Control design that can coherently work with all the web-app interaction mechanisms while addressing the above-mentioned limitations. We have implemented a prototype system on Android, and performed extensive evaluation on it. The evaluation results show that our system works well with existing commercial off-the-shelf Android apps and different versions of Android OS, and it can achieve the design goals with small overhead.
- Published
- 2022
- Full Text
- View/download PDF
7. Evaluation of a policy enforcement solution in telemedicine with offline use cases.
- Author
-
Szabó, Zoltán
- Subjects
ACCESS control ,EDGE computing ,INTERNET of things ,TELEMEDICINE - Abstract
The emerging popularity of telemedicine solutions brought an alarming problem due to the lack of proper access control solutions. With the inclusion of multi-tiered, heterogeneous infrastructures containing Internet of things and edge computing elements, the severity and complexity of the problem became even more alarming, calling for an established access control framework and methodology. The goal of the research is to define a possible solution with a focus on native cloud integration, possible deployment at multiple points along the path of the healthcare data, and adaptation of the fast healthcare interoperability resources standard. In this paper, the importance of this issue in offline use cases is presented and the effectiveness of the proposed solution is evaluated. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud
- Author
-
Bringer, Julien, Gallego, Beatriz, Karame, Ghassan, Kohler, Mathias, Louridas, Panos, Önen, Melek, Ritzdorf, Hubert, Sorniotti, Alessandro, Vallejo, David, Diniz Junqueira Barbosa, Simone, Series editor, Chen, Phoebe, Series editor, Du, Xiaoyong, Series editor, Filipe, Joaquim, Series editor, Kara, Orhun, Series editor, Kotenko, Igor, Series editor, Liu, Ting, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Katsikas, Sokratis K., editor, and Sideridis, Alexander B., editor
- Published
- 2015
- Full Text
- View/download PDF
9. A Metamodel of the B Modeling of Access-Control Policies: Work in Progress
- Author
-
Milhau, Jérémy, Frappier, Marc, Laleau, Régine, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Garcia-Alfaro, Joaquin, editor, and Lafourcade, Pascal, editor
- Published
- 2012
- Full Text
- View/download PDF
10. Zero Trust Architecture (ZTA): A Comprehensive Survey
- Author
-
Syed, Naeem, Shah, SW, Shaghaghi, A, Anwar, Adnan, Baig, Zubair, Ram Mohan Doss, Robin, Syed, Naeem, Shah, SW, Shaghaghi, A, Anwar, Adnan, Baig, Zubair, and Ram Mohan Doss, Robin
- Published
- 2022
11. Generalized Access Control of Synchronous Communication
- Author
-
Serban, Constantin, Minsky, Naftaly, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Dough, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, van Steen, Maarten, editor, and Henning, Michi, editor
- Published
- 2006
- Full Text
- View/download PDF
12. Health information systems (HIS) privacy restrictions for GDPR: Assessing initial impacts perceived by patients and healthcare professionals
- Author
-
Marcelo Carvalho, Paulo Bandiera-Paiva, José Machado, Eduardo P. Marques, and Universidade do Minho
- Subjects
020205 medical informatics ,Health professionals ,Information security ,RBAC ,Leadership and Management ,business.industry ,Internet privacy ,Access-Control ,Health Informatics ,02 engineering and technology ,Health informatics ,Computer Science Applications ,Consent ,03 medical and health sciences ,Medical Laboratory Technology ,0302 clinical medicine ,Health Information Management ,Privacy ,0202 electrical engineering, electronic engineering, information engineering ,Information systems ,030212 general & internal medicine ,Business ,GDPR - Abstract
The personal health information (PHI) that a health information system (HIS) stores and processes requires special caution to ensure authorized manipulation by system users. A diverse set of best practices, standards, and regulations are in place nowadays to achieve that purpose. To the access control element in a HIS, general data protection regulation (GDPR) will require explicit authorization and informed consent prior to this manipulation of patient information by healthcare practitioners in a system. The adaptations to cope this type of previous authorization on HIS requires not only a clear understanding of technicalities and modification to the underlying computational infrastructure but also the impact on players that interact with this type of system during healthcare service provision, namely patients and healthcare professionals. This article is an effort to understand this effect by means of collecting opinion from both players in a multicentric survey that presents different questions establishing scenarios that reflect this new control and its consequences., (undefined)
- Published
- 2021
13. Strengthen Electronic Health Records System (EHR-S) Access-Control to Cope with GDPR Explicit Consent
- Author
-
de Carvalho Junior, Marcelo Antonio and Bandiera-Paiva, Paulo
- Published
- 2020
- Full Text
- View/download PDF
14. Attribute-based credentials with cryptographic collusion prevention.
- Author
-
Hajny, Jan, Dzurenda, Petr, and Malina, Lukas
- Subjects
COMPUTER access control ,ANONYMITY ,SMARTPHONES ,MALWARE ,SMART cards - Abstract
Cryptographic attribute-based credentials (ABCs) allow users to prove their personal attributes remotely and in a privacyfriendly way. While staying anonymous and untraceable, the users are able to prove their attributes, such as age, membership, or nationality, before using a network service. Unfortunately, there are very few practical cryptographic ABC schemes available today. Furthermore, some existing schemes rely on the hardware tamper-resistance of smart cards to avoid collusion attacks. The trust in hardware limits the usage of such schemes on poorly protected cards and on smart phones. In this paper, we present the full cryptographic specification of an ABC scheme, which makes the collusion attacks impossible even on insecure hardware like mobile phones. Furthermore, the scheme provides features, which are difficult to achieve using existing schemes, namely the practical revocation of users, the de-anonymization of malicious users, and the unlinkability of verification sessions. Besides the cryptographic architecture, we also present our practical implementation on a smart phone and embedded platforms. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
15. Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
- Author
-
Ahsan, Md Manjurual, Gupta, Kishor Datta, Nag, Abhijit Kumar, Poudyal, Subash, Kouzani, Abbas Z., Mahmud, M. A. Parvez, Ahsan, Md Manjurual, Gupta, Kishor Datta, Nag, Abhijit Kumar, Poudyal, Subash, Kouzani, Abbas Z., and Mahmud, M. A. Parvez
- Published
- 2020
16. A Survey on Blockchain-based IoMT Systems: Towards Scalability
- Author
-
Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, and Dave Singelée
- Subjects
blockchain ,Technology ,Blockchain ,General Computer Science ,Computer science ,media_common.quotation_subject ,Internet of Things ,Wireless communication ,Wearable computer ,Cloud computing ,THINGS ,Internet of Medical Things (IoMT) ,security ,DATA-SECURITY ,Domain (software engineering) ,Engineering ,cloud ,General Materials Science ,Quality (business) ,INTERNET ,SCALABLE BLOCKCHAIN ,scalability ,media_common ,IOT ,Science & Technology ,Computer Science, Information Systems ,CHALLENGES ,business.industry ,General Engineering ,healthcare ,Engineering, Electrical & Electronic ,Benchmarking ,ENABLING TECHNOLOGIES ,Blockchains ,FRAMEWORK ,ELECTRONIC HEALTH RECORDS ,TK1-9971 ,Risk analysis (engineering) ,Scalability ,Computer Science ,Medical services ,Telecommunications ,The Internet ,Electrical engineering. Electronics. Nuclear engineering ,ACCESS-CONTROL ,business - Abstract
Recently, blockchain-based Internet of Medical Things (IoMT) has started to receive more attention in the healthcare domain as it not only improves the care quality using real-time and continuous monitoring but also minimizes the cost of care. However, there is a clear trend to include many entities in IoMT systems, such as IoMT sensor nodes, IoT wearable medical devices, patients, healthcare centers, and insurance companies. This makes it challenging to design a blockchain framework for these systems where scalability is a most critical factor in blockchain technology. Motivated by this observation, in this survey we review the state-of-the-art in blockchain-IoMT systems. Comparison and analysis of such systems prove that there is a substantial gap, which is the negligence of scalability. In this survey, we discuss several approaches proposed in the literature to improve the scalability of blockchain technology, and thus overcoming the above mentioned research gap. These approaches include on-chain and off-chain techniques, based on which we give recommendations and directions to facilitate designing a scalable blockchain-based IoMT system. We also recommended that a designer considers the well-known trilemma along with the various dimensions of a scalable blockchain system to prevent sacrificing security and decentralization as well. Moreover, we raise several research questions regarding benchmarking; addressing these questions could help designers determining the existing bottlenecks, leading to a scalable blockchain.
- Published
- 2021
- Full Text
- View/download PDF
17. Data Safety Policy Considerations in Educational Information Management Systems.
- Author
-
Lai, Kai and Lv, Xiaodong
- Abstract
Data safety is one of key technologies in the EIMSs. According to the characteristics of the EIMSs, we propose an innovative architecture of EIMSs with emphasis on several important issues. The architecture is deigned based on several policy models including data-safety defense policy authentication policy, data-access-control policy and data-security encryption policy. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
18. Privacy Models in Wireless Sensor Networks: A Survey
- Author
-
J. M. de Fuentes, Lorena González-Manzano, and Omid Mirzaei
- Subjects
Source-location privacy ,Engineering ,Privacy by Design ,02 engineering and technology ,Computer security ,computer.software_genre ,Scheme ,Research community ,lcsh:Technology (General) ,Protocol ,0202 electrical engineering, electronic engineering, information engineering ,Suitability analysis ,Preserving data aggregation ,Electrical and Electronic Engineering ,Set (psychology) ,Instrumentation ,Access-control ,Informática ,business.industry ,Query ,Comparability ,Privacy protection ,020206 networking & telecommunications ,Work (electrical) ,Control and Systems Engineering ,lcsh:T1-995 ,020201 artificial intelligence & image processing ,business ,Wireless sensor network ,computer - Abstract
Wireless Sensor Networks (WSNs) are attracting attention from the research community. One of the key issues is to provide them with privacy protection. In recent years, a huge amount of contributions has been focused on this area. Surveys and literature reviews have also been produced to give a systematic view of the different approaches taken. However, no previous work has focused on privacy models, that is, the set of assumptions made to build the approach. In particular, this paper focuses on this matter by studying 41 papers of the last 5 years. We highlight the great differences appearing among related papers that could make them incompatible to be applied simultaneously. We propose a set of guidelines to build comprehensive privacy models so as to foster their comparability and suitability analysis for different scenarios. This work was supported by the MINECO Grant TIN2013-46469-R (Security and Privacy in the Internet of You (SPINY)) and the CAM Grant S2013/ICE-3095 (Cybersecurity,Data, and Risks (CIBERDINE)), which is cofunded by EuropeanFunds (FEDER). Furthermore, J.M. de Fuentes and L. González-Manzano were also partially supported by the Programa de Ayudas a la Movilidad of Carlos III University of Madrid.
- Published
- 2016
- Full Text
- View/download PDF
19. BOUNCER: Privacy-aware Query Processing Over Federations of RDF Datasets
- Author
-
Endris, Kemele M, Almhithawi, Zuhair, Lytra, Ioanna, Vidal, Maria-Esther, Auer, Sören, Endris, Kemele M, Almhithawi, Zuhair, Lytra, Ioanna, Vidal, Maria-Esther, and Auer, Sören
- Abstract
Data provides the basis for emerging scientific and interdisciplinary data-centric applications with the potential of improving the quality of life for the citizens. However, effective data-centric applications demand data management techniques able to process a large volume of data which may include sensitive data, e.g., financial transactions, medical procedures, or personal data. Managing sensitive data requires the enforcement of privacy and access control regulations, particularly, during the execution of queries against datasets that include sensitive and nonsensitive data. In this paper, we tackle the problem of enforcing privacy regulations during query processing, and propose BOUNCER, a privacy-aware query engine over federations of RDF datasets. BOUNCER allows for the description of RDF datasets in terms of RDF molecule templates, i.e., abstract descriptions of the properties of the entities in an RDF dataset and their privacy regulations. Furthermore, BOUNCER implements query decomposition and optimization techniques able to identify query plans over RDF datasets that not only contain the relevant entities to answer a query, but that are also regulated by policies that allow for accessing these relevant entities. We empirically evaluate the effectiveness of the BOUNCER privacy-aware techniques over state-of-the-art benchmarks of RDF datasets. The observed results suggest that BOUNCER can effectively enforce access control regulations at different granularity without impacting the performance of query processing.
- Published
- 2018
20. BOUNCER: Privacy-aware Query Processing Over Federations of RDF Datasets
- Author
-
Zuhair Almhithawi, Sören Auer, Maria-Esther Vidal, Kemele M. Endris, and Ioanna Lytra
- Subjects
Information retrieval ,business.industry ,Process (engineering) ,Computer science ,Data management ,Federated Engine ,Access control ,02 engineering and technology ,Linked data ,computer.file_format ,Query plan ,Dewey Decimal Classification::000 | Allgemeines, Wissenschaft::000 | Informatik, Wissen, Systeme::004 | Informatik ,020204 information systems ,Linked Data ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Privacy law ,RDF ,ddc:004 ,business ,Semantic Web ,computer ,Access-control - Abstract
Data provides the basis for emerging scientific and interdisciplinary data-centric applications with the potential of improving the quality of life for the citizens. However, effective data-centric applications demand data management techniques able to process a large volume of data which may include sensitive data, e.g., financial transactions, medical procedures, or personal data. Managing sensitive data requires the enforcement of privacy and access control regulations, particularly, during the execution of queries against datasets that include sensitive and non-sensitive data. In this paper, we tackle the problem of enforcing privacy regulations during query processing, and propose BOUNCER, a privacy-aware query engine over federations of RDF datasets. BOUNCER allows for the description of RDF datasets in terms of RDF molecule templates, i.e., abstract descriptions of the properties of the entities in an RDF dataset and their privacy regulations. Furthermore, BOUNCER implements query decomposition and optimization techniques able to identify query plans over RDF datasets that not only contain the relevant entities to answer a query, but that are also regulated by policies that allow for accessing these relevant entities. We empirically evaluate the effectiveness of the BOUNCER privacy-aware techniques over state-of-the-art benchmarks of RDF datasets. The observed results suggest that BOUNCER can effectively enforce access control regulations at different granularity without impacting the performance of query processing.
- Published
- 2018
- Full Text
- View/download PDF
21. The Survey on Near Field Communication
- Author
-
Vedat Coskun, Busra Ozdenizci, Kerem Ok, Işık Üniversitesi, Fen Edebiyat Fakültesi, Enformasyon Teknolojileri Bölümü, Işık University, Faculty of Arts and Sciences, Department of Information Technologies, Coşkun, Vedat, Ok, Kerem, and Özdenizci Köse, Büşra
- Subjects
Technology ,Engineering ,Ubiquitous computing ,Internet of Things ,Access-Control ,NFC ,Near Field Communication ,NFC ecosystem ,Review ,lcsh:Chemical technology ,Biochemistry ,Analytical Chemistry ,Near field communication ,Protocol ,lcsh:TP1-1185 ,NFC Applications ,Payment ,Secure element ,Instrumentation ,Protocol (object-oriented programming) ,NFC Ecosystem ,media_common ,Authentication ,Atomic and Molecular Physics, and Optics ,Management ,NFC Usability ,The Internet ,Internet of things ,media_common.quotation_subject ,secure element ,Access control ,World Wide Web ,Wireless Body Sensors ,Electrical and Electronic Engineering ,Internet ,business.industry ,NFC usability ,ubiquitous computing ,NFC Survey ,Usability ,NFC security ,Data science ,NFC applications ,NFC Security ,Acceptance ,NFC survey ,Antenna ,business - Abstract
PubMed ID: 26057043 Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem. Publisher's Version
- Published
- 2015
- Full Text
- View/download PDF
22. ase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environments
- Author
-
Lorena González-Manzano, Kim-Kwang Raymond Choo, and José María de Fuentes
- Subjects
Informática ,business.industry ,Computer science ,020206 networking & telecommunications ,Access control ,Cloud computing ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Privilege (computing) ,Computer security ,computer.software_genre ,Proof of ownership ,Symmetric Encryption ,Upload ,Symmetric-key algorithm ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Data deduplication ,020201 artificial intelligence & image processing ,business ,computer ,Cloud storage ,Deduplication technique ,Access-control ,Computer network - Abstract
Proof-of-Ownership (PoW) can be an efective deduplication technique to reduce storage requirements, by providing cloud storage servers the capability to guarantee that clients only upload and download files that they are in possession of. In this paper, we propose an attribute symmetric encryption PoW scheme (ase-PoW) for hierarchical environments such as corporations, in which (1) the external cloud service provider is honest-but-curious and (2) there is a exible access control in place to ensure only users with the right privilege can access sensitive files. This is, to the best of our knowledge, the first such scheme and it is built upon the ce-PoW scheme of Gonzalez-Manzano and Orfila (2015). Ase-PoW outperforms ce-PoW in that it does not suffer from content-guessing attacks, it reduces client storage needs and computational workload. This work was partially supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You) and the CAM grant S2013/ICE-3095 CIBERDINE-CM (CIBERDINE: Cybersecurity, Data, and Risks) funded by Madrid Autonomous Community and co-funded by European funds. L. Gonzalez and J. M. de Fuentes were also supported by the Programa de Ayudas para la Movilidad of Carlos III University of Madrid, Spain.
- Published
- 2016
23. Model-based Analysis of Java EE Web Security Configurations
- Author
-
Salvador Martínez, Valerio Cosentino, Jordi Cabot, IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Laboratoire d'Informatique de Nantes Atlantique (LINA), Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS), Modeling Technologies for Software Production, Operation, and Evolution (ATLANMOD), Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Département informatique - EMN, Mines Nantes (Mines Nantes)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN), and Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Département informatique - EMN
- Subjects
Cloud computing security ,Computer science ,business.industry ,020207 software engineering ,02 engineering and technology ,Reverse-engineering ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,Computer security model ,Computer security ,computer.software_genre ,Web application security ,Security testing ,Security information and event management ,Security service ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Security through obscurity ,Security ,Network security policy ,business ,computer ,Access-control - Abstract
International audience; The widespread use of Java EE web applications as a means to provide distributed services to remote clients imposes strong security requirements, so that the resources managed by these applications remain protected from unauthorized disclosures and manipulations. For this purpose, the Java EE framework provides developers with mechanisms to define access-control policies. Unfortunately , the variety and complexity of the provided security configuration mechanisms cause the definition and manipulation of a security policy to be complex and error prone. As security requirements are not static, and thus, implemented policies must be changed and reviewed often, discovering and representing the policy at an appropriate abstraction level to enable their understanding and reenginering appears as a critical requirement. To tackle this problem, this paper presents a (model-based) approach aimed to help security experts to visualize, (automatically) analyse and manipulate web security policies.
- Published
- 2016
- Full Text
- View/download PDF
24. Formal Firewall Conformance Testing: An Application of Test and Proof Techniques
- Author
-
Brucker, Achim D., Lukas, Brügger, Wolff, Burkhart, SAP Research [Karlsruhe], SAP Research-Karlsruher Institut für Technologie (KIT), Eidgenössische Technische Hochschule - Swiss Federal Institute of Technology [Zürich] (ETH Zürich), Laboratoire de Recherche en Informatique (LRI), Université Paris-Sud - Paris 11 (UP11)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Université Paris-Sud - Paris 11 (UP11), and Centre National de la Recherche Scientifique (CNRS)
- Subjects
Network Security ,Formal Testing ,Firewalls ,[SCCO.COMP]Cognitive science/Computer science ,Formal Methods ,Access-control - Abstract
International audience; Firewalls are an important means to secure critical ICT infrastructures. As configurable off-the-shelf products, the effectiveness of a firewall crucially depends on both the correctness of the implementation itself as well as the correct configuration. While testing the implementation can be done once by the manufacturer, the configuration needs to be tested for each application individually. This is particularly challenging as the configuration, implementing a firewall policy, is inherently complex, hard to understand, administrated by different stakeholders and, thus, difficult to validate.This paper presents a formal model of both stateless and stateful firewalls (packet filters), including network address translation (NAT), to which a specification-based conformance test case generation approach is applied. Furthermore, a verified optimisation technique for this approach is presented: Starting from a formal model for stateless firewalls, a collection of semantics-preserving policy transformation rules and an algorithm that optimises the specification with respect of the number of test cases required for path coverage of the model are derived. We extend an existing approach that integrates verification and testing, i. e., tests and proofs to support conformance testing of network policies.The presented approach is supported by a test framework that allows to test actual firewalls using the test cases generated based on the formal model. Finally, a report on several larger case studies is presented.
- Published
- 2015
- Full Text
- View/download PDF
25. Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems
- Author
-
Jordi Cabot, Nora Cuppens-Boulahia, Salvador Martínez, Frédéric Cuppens, Joaquin Garcia-Alfaro, Modeling Technologies for Software Production, Operation, and Evolution (ATLANMOD), Laboratoire d'Informatique de Nantes Atlantique (LINA), Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Département informatique - EMN, Mines Nantes (Mines Nantes)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS), Mines Nantes (Mines Nantes), Département Réseaux et Services de Télécommunications (TSP - RST), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Département Logique des Usages, Sciences sociales et Sciences de l'Information (LUSSI), Université européenne de Bretagne - European University of Brittany (UEB)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT), Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Lab-STICC_TB_CID_SFIIS, Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Hannes Federrath, Dieter Gollmann, TC 11, Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Département informatique - EMN, Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN), Département Réseaux et Services de Télécommunications (RST), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), and Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM)
- Subjects
access-control ,Cloud computing security ,Computer science ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,Computer security model ,Asset (computer security) ,Computer security ,computer.software_genre ,Security testing ,Security information and event management ,Security service ,Information security standards ,Security ,Security convergence ,Model-driven engineering ,computer - Abstract
Part 2: Web Security; International audience; Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to 1) achieve the global security goal and 2) facilitate the analysis of the security status of the whole system. For the specific case of access-control, access-control policies may be found in several components (databases, networks and applications) all, supposedly, working together in order to meet the high level security property. In this work we propose an integration mechanism for access-control policies to enable the analysis of the system security. We rely on model-driven technologies and the XACML standard to achieve this goal.
- Published
- 2015
- Full Text
- View/download PDF
26. Automatic reconstruction and analysis of security policies from deployed security components
- Author
-
Martínez, Salvador, Laboratoire d'Informatique de Nantes Atlantique (LINA), Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN), Modeling Technologies for Software Production, Operation, and Evolution (ATLANMOD), Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Département informatique - EMN, Mines Nantes (Mines Nantes)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Ecole des Mines de Nantes, Frédéric Cuppens, Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS), and Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Département informatique - EMN
- Subjects
Access-Control ,Sûreté ,Security ,Contrôle d’accès ,[INFO.INFO-SY]Computer Science [cs]/Systems and Control [cs.SY] ,Reverse-engineering ,Ingénierie dirigée par les modèles ,Rétro-ingénierie ,Model-driven - Abstract
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed by a number of heterogeneous subsystems, each subsystem plays a key role in the global system security. For the specific case of access-control, access-control policies may be found in several components (databases, networksand applications) all, supposedly, working together. Nevertheless since most times these policies have been manually implemented and/or evolved separately they easily become inconsistent. In this context, discovering and understanding which security policies are actually being enforced by the information system comes out as a critical necessity. The main challenge to solve is bridging the gap between the vendor-dependent security features and a higher-level representation that express these policies in a way that abstracts from the specificities of concrete system components, and thus, it´s easier to understand and reason with. This high-level representation would also allow us to implement all evolution/refactoring/manipulation operations on the security policies in a reusable way. In this work we propose such a reverse engineering and integration mechanism for access-control policies. We rely on model-driven technologies to achieve this goal.; La sécurité est une préoccupation essentielle pour tout système d’information. Propriétés de sécurité telles que la confidentialité, l’intégrité et la disponibilité doivent être appliquées afin de rendre les systèmes sures. Dans les environnements complexes, où les systèmes d’information sont composés par un certain nombre de sous-systèmes hétérogènes, chaque sous-système joue un rôle clé dans la sécurité globale du système. Dans le cas spécifique du contrôle d’accès, politiques de contrôle d’accès peuvent être trouvées dans différents composants (bases de données, réseaux, etc.), ces derniers étant sensés travailler ensemble. Néanmoins , puisque la plupart de ces politiques ont été mises en œuvre manuellement et / ou évolué séparément ils deviennent facilement incompatibles. Dans ce contexte, la découverte et compréhension des politiques de sécurité appliquées par le système d’information devient une nécessité critique. Le principal défi à résoudre est de combler le fossé entre les caractéristiques de sécurité dépendant du fournisseur et une représentation de plus haut niveau que exprime ces politiques d’une manière faisant abstraction des spécificités de composants concrètes, et donc, plus facile à comprendre et à raisonner avec. Cette représentation de haut niveau nous permettrait également de mettre en œuvre tous les opérations de évolution / refactoring / manipulation sur les politiques de sécurité d’une manière réutilisable. Dans ce travail, nous proposons un tel mécanisme de rétro-ingénierie et d’intégration des politiques de contrôle d’accès. Nous comptons sur les technologies de l’ingénierie dirigée par les modèles pour atteindre cet objectif .
- Published
- 2014
27. A Secure Non-monotonic Soft Concurrent Constraint Language
- Author
-
Stefano Bistarelli and Francesco Santini
- Subjects
Concurrent constraint logic programming ,Bisimulation ,COORDINATION ,Algebra and Number Theory ,Theoretical computer science ,Relation (database) ,Computer science ,Programming language ,Constraint satisfaction ,Computer security model ,computer.software_genre ,Theoretical Computer Science ,Constraint (information theory) ,Set (abstract data type) ,Computational Theory and Mathematics ,ACCESS-CONTROL, COORDINATION ,Constraint programming ,ACCESS-CONTROL ,computer ,Information Systems - Abstract
We present a fine-grained security model to enforce the access control on the shared constraint store in Concurrent Constraint Programming (CCP) languages. We show the model for a non-monotonic version of Soft CCP (SCCP), that is an extension of CCP where the constraints have a preference level associated with them. Crisp constraints can be modeled in the same framework as well. In the considered non-monotonic soft version (NmSCCP), it is also possible to remove constraints from the store. The language can be used for coordinating agents on a common store of information that represents the set of shared resources. In such scenarios, it is clearly important to enforce the integrity and confidentiality rights on the resources, in order, for instance, to hide part of the information to some agents, or to prevent an agent to consume too many resources. Finally, we present a bisimulation relation to check equivalence between two programs written in this language.
- Published
- 2014
28. On Formal Specification and Analysis of Security Policies
- Author
-
Bourdier, Tony, Cirstea, Horatiu, Jaume, Mathieu, Kirchner, Hélène, Formal islands: foundations and applications (PAREO), INRIA Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS), Sémantiques, preuves et implantation (SPI), Laboratoire d'Informatique de Paris 6 (LIP6), Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS), Inria Bordeaux - Sud-Ouest, Institut National de Recherche en Informatique et en Automatique (Inria), ANR-06-SETI-0016,SSURF,Sûreté et sécurité avec focal(2006), and Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique de Lorraine (INPL)-Université Nancy 2-Université Henri Poincaré - Nancy 1 (UHP)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique de Lorraine (INPL)-Université Nancy 2-Université Henri Poincaré - Nancy 1 (UHP)
- Subjects
security properties ,access-control ,[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL] ,security policy ,constrained rewriting ,first-order logical specification ,reduction systems - Abstract
International audience; Security policies are ubiquitous in information systems and more generally in the management of sensitive information. Access control policies are probably the most largely used policies but their application goes well beyond this application domain. The enforcement of security policies is useless if some of their key properties like the consistency, for example, cannot be stated and checked. We propose here a framework where the security policies and the systems they are applied on, are specified separately but using a common formalism. This separation allows us not only some analysis of the policy independently of the target system but also the application of a given policy on different systems. Besides the abstract formalism we also explore how rewrite and reduction systems can be used and combined in a rather systematic way to provide executable specifications for this framework. We also propose a notion of system and policy transformation that gives the possibility to study some properties which cannot be expressed only within the initial presentation. We have shown, in particular, how confidentiality, integrity and confinment can be expressed for the BLP policy that does not deal explicitly with information flows but only with objects containing tractable information.
- Published
- 2010
29. Formal Modeling and Verification of Access-Control Policies
- Author
-
FUNDP - INF_Pôle sémantique, logique et calcul, FUNDP - Ecole doctorale en information et communication, Schobbens, Pierre-Yves, Jacquet, Jean-Marie, Colin, Jean-Noël, Morisset, Charles, Le Traon, Yves, Toussaint, Hubert, FUNDP - INF_Pôle sémantique, logique et calcul, FUNDP - Ecole doctorale en information et communication, Schobbens, Pierre-Yves, Jacquet, Jean-Marie, Colin, Jean-Noël, Morisset, Charles, Le Traon, Yves, and Toussaint, Hubert
- Abstract
The construction of secure software is a notoriously difficult task. The abstract security requirements have to be turned into functional requirements and then implemented. However, only few techniques allow to verify that the implemented elements fulfill the originally expressed requirements. The potential gap between the specification and the implementation gets even wider with iterative development schemes where code (and sometimes specification) is updated numerous times. In this document we propose a methodology aimed at facilitating the co-evolution of the security requirements and the implemented code. Focusing on the access-control perspective, we provide models and algorithms to specify the expected requirements and to extract the implemented access-control rules directly from the executable source code. Then we verify the conformance of the implemented features towards the specified requirements and, if inconsistencies are found, we provide potential corrective measures that can be applied directly into the source code., (DOCSC06) -- FUNDP, 2011
- Published
- 2011
30. Re-authentication of Critical Operations
- Author
-
Yachouh, Marwan and Yachouh, Marwan
- Abstract
This is a study on the development of a re-authentication prototype. Re- authentication serves as a receipt for e.g. system administrators that authorise them to carry out a critical operation in a system that already is protected by a security architecture. A critical operation is a kind of operation that can cause serious damage to a network node or a set of network nodes, if it is done without one giving it a second thought. The purpose is to prevent mistakes and secure the users’ audit trail. The main task is to propose and implement a re-authentication prototype, that is to enable the incorporation of the re-authentication prototype to an already complete security architecture and yet preserve the security and performance level of the architecture. This thesis deals with this problem by using digitally signed certificates to provide the necessary security issues. The certificates used are called re- authentication certificates and follows the X.509 attribute certificate standard. The re-authentication certificate is optimised so that it only holds authorisation information regarding one critical operation. An access control decision function is used to decide if the re-authentication certificate and its owner are authentic. On basis of that decision the user can get the authority to execute critical operations. The finished prototype confirms that a re-authentication can be incorporated with the security architecture. The report also shows that the security status of the architecture is preserved. The performance of the prototype is rather difficult to prove since the prototype implementation only initialises the objects that are required to prove the security issues. A performance test can therefore never prove how the prototype will perform in an authentic environment. The performance is assumed to be adequate since it uses the same authentication function that is used by the security architecture.
- Published
- 2002
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.