首页> 外文期刊>IEEE transactions on industrial informatics >An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models
【24h】

An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models

机译:工业软件访问控制模型有效的进化分析方案

获取原文
获取原文并翻译 | 示例
           

摘要

Access control is an essential feature of industrial software systems security mechanisms. Role-based access control (RBAC), which is likely the most popular access-control technique, specifies "user roles" and associates each role with "permissions" to access distinct system functionalities. These role-permissions assignment rules, as well as the types of system users and system functionalities, evolve over time. In this paper, we describe a methodology for analyzing and understanding the RBAC-configuration evolution, its relation to the overall evolutionary lifecycle of industrial systems, and its impact on security vulnerabilities from which the system may suffer. Our methodology considers two different sources of information regarding the RBAC-configuration evolution: 1) the role-permissions matrices of subsequent system versions; and 2) the corresponding concept lattices, implied by these matrices. By examining the evolution of these two system properties, developers can easily notice which versions involve-more and more complex RBAC-configuration changes that may indicate higher security risks. We demonstrate our methodology using a study of four popular real-world systems: 1) MediaWiki; 2) Moodle; 3) Joomla; and 4) WordPress. Our findings show that the proposed metrics have strong, positive linear correlations with the security vulnerabilities' properties.
机译:访问控制是工业软件系统安全机制的重要特征。基于角色的访问控制(RBAC)可能是最流行的访问控制技术,指定了“用户角色”,并将每个角色与“权限”关联以访问不同的系统功能。这些角色权限分配规则以及系统用户和系统功能的类型,随着时间的推移而发展。在本文中,我们描述了一种分析和理解RBAC配置演进的方法,其与工业系统的整体进化生命周期的关系,其对系统可能遭受的安全漏洞的影响。我们的方法考虑了有关RBAC配置演进的两个不同的信息来源:1)后续系统版本的角色权限矩阵; 2)由这些矩阵暗示的相应概念格子。通过检查这两个系统属性的演变,开发人员可以轻松注意哪些版本涉及 - 越来越复杂的RBAC配置更改,可以指示更高的安全风险。我们使用对四个流行的真实系统的研究展示了我们的方法:1)MediaWiki; 2)Moodle; 3)Joomla;和4)WordPress。我们的研究结果表明,拟议的指标与安全漏洞的属性强,正线性相关性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号