Entry Leonard:2013:MAP from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Leonard:2013:MAP,
author = "Thomas Leonard and Martin Hall-May and Mike Surridge",
title = "Modelling Access Propagation in Dynamic Systems",
journal = j-TISSEC,
volume = "16",
number = "2",
pages = "5:1--5:??",
month = sep,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2516951.2516952",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Mon Sep 23 17:04:07 MDT 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Access control is a critical feature of many systems,
including networks of services, processes within a
computer, and objects within a running process. The
security consequences of a particular architecture or
access control policy are often difficult to determine,
especially where some components are not under our
control, where components are created dynamically, or
where access policies are updated dynamically. The
SERSCIS Access Modeller (SAM) takes a model of a system
and explores how access can propagate through it. It
can both prove defined safety properties and discover
unwanted properties. By defining expected behaviours,
recording the results as a baseline, and then
introducing untrusted actors, SAM can discover a wide
variety of design flaws. SAM is designed to handle
dynamic systems (i.e., at runtime, new objects are
created and access policies modified) and systems where
some objects are not trusted. It extends previous
approaches such as Scollar and Authodox to provide a
programmer-friendly syntax for specifying behaviour,
and allows modelling of services with mutually
suspicious clients. Taking the Confused Deputy example
from Authodox we show that SAM detects the attack
automatically; using a web-based backup service, we
show how to model RBAC systems, detecting a missing
validation check; and using a proxy certificate system,
we show how to extend it to model new access
mechanisms. On discovering that a library fails to
follow an RFC precisely, we re-evaluate our existing
models under the new assumption and discover that the
proxy certificate design is not safe with this
library.",
acknowledgement = ack-nhfb,
articleno = "5",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(1)2,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(2)7,
18(3)11
- architecture,
2(2)177,
2(3)269,
4(3)289,
8(2)187,
10(4)6,
11(1)2,
11(1)3,
13(4)37,
14(1)3,
15(1)2,
15(3)13,
16(1)1,
16(3)11,
17(2)8,
18(2)8
- assumption,
2(3)230,
2(3)332,
3(3)161,
9(2)181,
11(2)3,
11(2)6,
11(4)20,
12(1)1,
12(1)3,
12(2)9,
12(4)21,
13(4)38,
15(1)4,
15(3)12,
16(1)4,
16(4)13,
18(3)10
- automatically,
10(2)8,
12(2)10,
13(3)24,
14(1)2,
15(2)6,
15(4)18,
16(2)7,
17(2)7,
17(4)13,
18(3)9
- both,
1(1)26,
1(1)93,
2(1)65,
2(4)416,
9(2)181,
10(1)4,
10(3)12,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(3)15,
11(3)16,
11(4)22,
12(1)2,
12(2)13,
12(3)15,
12(4)20,
13(4)30,
13(4)33,
14(3)24,
15(1)5,
15(2)10,
15(3)11,
15(3)13,
16(1)4,
16(3)10,
16(4)17,
17(3)9,
18(1)1,
18(4)13,
18(4)14
- certificate,
2(2)138,
2(3)230,
7(1)21,
10(3)11,
13(3)25,
16(4)15
- check,
2(1)65,
10(2)7,
12(2)10,
12(3)19,
17(3)10,
18(2)8,
18(4)13
- client,
2(3)230,
2(4)390,
10(2)8,
10(4)4,
11(2)2,
11(3)16,
12(3)14,
12(3)16,
13(4)30,
14(1)12,
14(3)27,
14(4)32,
16(3)11,
16(3)12,
16(4)13,
17(2)5,
17(4)15
- component,
2(1)105,
9(4)421,
11(3)13,
13(3)24,
13(3)28,
13(4)32,
15(3)13,
16(3)9,
18(2)8
- computer,
1(1)66,
2(1)34,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)416,
10(2)5,
11(4)20,
12(2)7,
13(2)11,
15(1)1,
15(2)9,
17(2)6
- consequence,
2(2)138,
12(1)2,
14(1)2,
16(4)14,
17(1)2
- created,
10(4)5
- critical,
11(4)23,
12(4)20,
13(4)38,
15(2)9,
17(3)12
- defined,
2(1)105,
12(1)1,
13(1)10,
13(3)20,
13(3)26,
14(3)25,
15(2)6,
16(1)4,
17(1)3
- defining,
13(1)7,
17(1)3
- design,
1(1)66,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
2(4)416,
10(2)7,
10(3)11,
10(4)1,
11(1)2,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
14(3)24,
15(3)13,
16(2)6,
16(2)8,
16(4)16,
17(1)4,
17(2)7,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- designed,
2(4)416,
10(3)10,
10(3)11,
10(3)12,
11(1)2,
11(3)12,
12(4)21,
12(4)22,
13(3)25,
13(4)38,
16(2)8,
16(3)9,
16(3)10,
16(4)14,
17(4)13,
18(1)3
- detect,
2(3)295,
10(4)6,
11(3)14,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(3)19,
14(1)13,
15(2)6,
16(4)14,
17(4)16,
18(2)7,
18(3)9
- detecting,
4(1)1,
11(2)2,
11(3)12,
11(4)19,
14(1)2,
14(2)21,
15(3)11
- determine,
1(1)3,
11(2)3,
11(2)6,
11(3)16,
12(4)20,
13(3)26,
13(4)38,
13(4)40,
14(1)2,
14(4)32,
17(1)1,
17(2)8
- difficult,
11(2)2,
11(2)5,
11(3)15,
11(3)16,
13(3)28,
17(1)4,
17(3)12,
17(4)16,
18(3)9,
18(4)13
- discover,
13(4)36
- discovering,
13(3)27
- dynamic,
2(1)65,
3(3)136,
5(4)367,
7(1)21,
10(2)7,
10(4)4,
11(2)3,
11(3)15,
12(1)6,
12(2)10,
12(3)18,
13(2)14,
13(4)32,
14(2)15,
14(3)24,
15(3)13,
17(2)5,
17(4)15,
18(3)11
- dynamically,
9(4)421,
11(2)5,
11(4)18,
12(3)19,
16(2)6
- especially,
2(1)105,
11(2)1,
11(3)15,
11(4)17,
12(3)15,
12(4)21,
13(3)20,
15(2)9,
17(4)16
- example,
10(4)5,
12(1)1,
12(2)11,
12(3)19,
12(4)20,
13(3)20,
13(4)30,
13(4)35,
13(4)39,
13(4)40,
15(2)10,
16(1)3,
16(3)10,
17(1)2,
17(1)4,
18(1)1,
18(2)8,
18(4)13
- existing,
1(1)93,
11(1)2,
11(3)15,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)3,
12(2)12,
12(3)14,
13(3)27,
13(4)36,
14(1)13,
14(3)25,
14(4)30,
15(1)4,
15(2)9,
15(3)12,
16(3)10,
16(4)15,
17(1)2,
17(1)4,
17(2)5,
17(2)7,
17(4)15,
18(1)1,
18(3)10
- expected,
11(4)20,
15(2)10,
17(3)11
- explore,
12(2)8,
12(2)12,
13(4)31
- extend,
2(4)354,
2(4)390,
9(4)461,
10(1)2,
11(4)20,
12(1)5,
13(3)24,
14(1)8,
14(3)26,
15(1)4,
16(1)4,
16(3)9,
16(3)10,
17(2)5,
17(2)7,
17(4)15
- fail,
11(2)3,
12(2)8,
12(4)22,
13(3)25,
17(3)9
- feature,
2(1)34,
2(2)177,
2(3)295,
3(4)227,
10(1)2,
10(3)12,
11(4)22,
13(3)24,
13(4)32,
13(4)35,
13(4)41,
16(2)7,
16(4)13,
16(4)14,
17(3)10,
17(4)16,
18(2)5,
18(3)11
- flaws.,
17(1)4
- follow,
9(4)421,
12(2)10
- handle,
12(1)5,
12(3)18,
15(3)13
- how,
2(1)3,
2(2)138,
2(3)269,
7(2)319,
10(2)5,
10(2)8,
10(4)1,
10(4)2,
10(4)5,
11(3)13,
11(4)18,
12(1)2,
12(2)9,
12(2)12,
12(3)18,
12(3)19,
13(1)10,
13(2)13,
13(3)25,
13(4)31,
13(4)36,
14(1)2,
14(3)26,
15(1)5,
15(3)14,
15(4)15,
16(1)3,
16(2)8,
17(1)1,
17(1)2,
17(1)3,
17(4)15,
18(1)1,
18(1)3,
18(2)6,
18(3)9,
18(4)14
- i.e.,
1(1)93,
12(2)10,
12(3)18
- including,
2(2)177,
2(3)295,
10(2)6,
10(3)11,
10(4)1,
11(2)2,
11(3)14,
11(4)20,
11(4)22,
12(2)12,
12(3)14,
12(3)19,
13(4)32,
14(1)13,
15(2)6,
15(3)12,
16(2)7,
16(4)17,
18(1)1,
18(1)4
- introducing,
11(3)12,
17(3)9
- it,
1(1)26,
10(3)10,
11(3)12,
13(1)10,
14(1)12
- library,
2(4)354,
10(2)8,
12(2)10,
14(4)31,
15(1)2,
16(3)9,
18(1)4
- many,
1(1)93,
2(1)65,
2(2)159,
2(3)332,
10(1)4,
10(4)1,
11(3)13,
11(4)22,
11(4)23,
12(1)2,
12(3)17,
12(3)18,
13(3)20,
13(3)22,
13(4)38,
13(4)39,
15(1)4,
15(2)6,
15(2)7,
16(3)9,
16(4)17,
17(1)4,
17(3)12,
18(1)1,
18(4)13
- mechanism,
2(2)177,
3(1)51,
10(2)8,
10(4)4,
10(4)6,
11(2)5,
11(3)12,
11(3)16,
12(1)4,
12(2)9,
12(2)11,
12(2)13,
12(3)15,
12(3)19,
12(4)22,
13(3)21,
13(3)24,
13(3)25,
13(3)28,
13(4)29,
14(1)3,
14(1)11,
14(3)24,
14(3)27,
15(1)5,
15(2)6,
15(2)10,
16(1)3,
16(3)12,
17(1)3,
17(2)5,
17(3)10,
18(4)14
- missing,
10(1)2,
12(2)13,
17(1)2
- modified,
9(4)421,
16(3)10
- mutually,
10(2)5,
17(2)6,
18(2)5
- new,
1(1)3,
1(1)93,
2(1)105,
2(2)138,
2(3)295,
9(2)181,
9(4)461,
10(1)3,
10(2)6,
10(4)6,
11(4)17,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(2)15,
13(4)29,
13(4)34,
14(1)4,
14(1)5,
14(1)6,
14(1)13,
14(3)23,
14(3)27,
14(4)30,
15(1)3,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)15,
16(2)7,
16(3)12,
16(4)16,
16(4)17,
17(1)4,
17(2)7,
17(3)10,
17(4)15,
18(1)1,
18(1)2,
18(3)10,
18(3)11
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- object,
1(1)26,
10(1)2,
11(1)3,
12(3)18,
14(3)23,
16(4)13,
18(3)9
- often,
2(1)65,
10(1)4,
10(2)8,
10(3)10,
10(3)12,
11(1)2,
11(3)12,
11(4)20,
17(1)2,
17(1)4
- particular,
2(2)177,
2(4)390,
10(4)1,
10(4)2,
10(4)3,
11(2)6,
12(4)21,
13(4)40,
14(1)2,
15(3)14,
17(3)9,
17(4)14
- precisely,
10(1)4,
11(4)21,
12(3)19,
16(2)8
- previous,
1(1)3,
1(1)93,
2(2)138,
11(2)3,
11(4)20,
12(3)16,
12(3)18,
13(1)10,
13(3)25,
14(1)3,
14(1)4,
15(2)9,
15(2)10,
16(4)13,
16(4)15,
16(4)17,
17(3)12
- process,
1(1)26,
2(1)65,
9(4)421,
10(3)9,
10(4)4,
11(1)2,
11(1)4,
11(4)18,
11(4)20,
12(2)11,
12(3)14,
13(1)10,
13(3)25,
13(4)36,
15(3)13,
16(2)7,
17(2)6,
17(4)14,
18(1)3
- propagate,
10(4)1,
13(3)21,
14(1)7
- propagation,
10(4)1,
11(1)3,
12(2)12
- property,
1(1)66,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(1)2,
11(3)12,
11(3)13,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(3)19,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)9,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
17(1)3,
17(1)4,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- prove,
10(2)8,
10(4)1,
11(2)6,
11(3)16,
11(4)18,
12(2)8,
12(3)16,
12(3)19,
13(3)28,
15(2)9,
16(1)4,
16(4)17,
17(2)5,
17(4)15,
18(2)8
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- proxy,
9(1)1,
12(2)13
- RBAC,
2(1)34,
2(1)105,
5(3)332,
7(3)392,
9(4)391,
10(1)2,
10(2)5,
12(1)1,
13(3)24,
13(3)27,
13(4)36,
14(1)3,
15(4)15,
15(4)18
- recording,
13(4)35
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- running,
10(4)4,
11(4)20,
12(2)10,
12(3)14,
13(1)10,
15(2)6,
15(4)16,
16(4)13
- runtime,
12(2)10,
13(3)25,
15(2)10,
16(1)4,
16(3)9,
17(3)11
- safe,
1(1)26,
12(3)14,
12(3)19,
15(2)10
- safety,
4(2)158,
9(3)352,
9(4)391,
12(2)8,
12(3)19,
16(1)3
- service,
2(4)354,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)4,
10(4)6,
11(1)2,
11(1)4,
11(3)15,
11(4)19,
12(2)12,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)6,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- specifying,
2(3)332,
9(4)421,
10(1)2,
10(1)3,
13(3)20,
14(1)8,
15(3)13
- suspicious,
11(4)18
- syntax,
11(4)21,
17(1)2
- take,
2(4)416,
10(4)1,
12(3)17,
12(3)19,
12(4)22,
13(3)20,
16(3)9,
16(3)10,
16(4)15,
17(3)10,
18(1)4,
18(2)5,
18(4)12
- taking,
12(2)11,
13(3)24
- then,
1(1)3,
2(1)3,
2(1)65,
2(2)138,
9(4)461,
10(1)2,
10(1)4,
11(2)4,
11(4)18,
12(2)8,
12(2)13,
12(3)18,
12(4)22,
13(1)10,
13(3)22,
13(3)25,
13(4)32,
14(4)30,
14(4)31,
14(4)32,
15(1)4,
15(2)6,
15(3)13,
15(4)18,
16(2)8,
17(3)9,
17(4)15,
18(1)3,
18(1)4,
18(4)12
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(2)2,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(2)7,
18(3)11
- trusted,
2(2)138,
2(3)269,
8(2)153,
10(4)3,
11(2)6,
11(3)14,
12(1)3,
13(4)39,
14(1)8,
14(3)27,
14(4)29,
15(2)9,
16(2)7,
16(4)15,
17(2)6,
18(2)8
- untrusted,
2(2)159,
2(3)269,
12(3)14,
12(3)16,
12(3)19,
13(4)35,
13(4)37,
14(1)12,
15(2)10,
16(3)12,
17(4)15,
18(3)10
- updated,
13(3)20,
14(3)26
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- validation,
15(4)16
- variety,
2(4)354,
10(3)11,
10(3)12,
14(1)10,
14(3)27,
15(4)15,
18(3)10
- where,
2(3)230,
9(4)461,
10(4)4,
10(4)5,
10(4)6,
11(3)12,
11(3)13,
11(4)19,
12(1)3,
12(3)15,
12(3)16,
12(4)20,
13(3)20,
13(3)22,
13(4)33,
13(4)37,
14(1)7,
15(2)6,
15(3)12,
15(3)13,
16(1)4,
17(3)10,
17(4)16,
18(1)2,
18(2)8
- wide,
11(4)19,
12(3)14,
13(3)21,
14(1)10,
15(1)2,
15(4)15,
16(2)7,
16(4)14,
16(4)17,
17(4)16