pdfreaders.org

Analyzing Access Control Overrides

Achim D. Brucker und Helmut Petritsch

Dynamic access control systems that allow users, e.g., in emergency situations, to overwrite access control restrictions. Systems supporting dynamic access control rely, in general, on a post-hoc analysis for assessing the overrides.

In this talk, we present a framework that makes is possible to support such assessment activities in particular and system audits in general. Moreover the present framework supports also security engineers in writing and debugging security policies.

Schlüsselwörter:
Kategorien:
Dokumente:

QR Code for talk:brucker.ea:aniketos:2011.Bitte zitieren sie diesen Artikel wie folgt:
Achim D. Brucker und Helmut Petritsch. Analyzing Access Control Overrides. PoFI 2011, Pisa, Italy, 9. jun. 2011.
(Folien) (Handout) (BibTeX) (Share article on LinkedIn. Share article on CiteULike.)

BibTeX
@Talk{ talk:brucker.ea:aniketos:2011,
abstract = {Dynamic access control systems that allow users, e.g., in emergency situations, to overwrite access control restrictions. Systems supporting dynamic access control rely, in general, on a post-hoc analysis for assessing the overrides.\\\\In this talk, we present a framework that makes is possible to support such assessment activities in particular and system audits in general. Moreover the present framework supports also security engineers in writing and debugging security policies.},
address = {Pisa, Italy},
author = {Achim D. Brucker and Helmut Petritsch},
day = {9},
event = {PoFI 2011},
handout = {https://www.brucker.ch/bibliography/download/2011/talk-brucker.ea-aniketos-2011-2x2.pdf},
isodate = {2010-09-21},
language = {USenglish},
lecturer = {Achim D. Brucker and Helmut Petritsch},
month = {jun},
slides = {https://www.brucker.ch/bibliography/download/2011/talk-brucker.ea-aniketos-2011.pdf},
title = {Analyzing Access Control Overrides},
url = {https://www.brucker.ch/bibliography/abstract/talk-brucker.ea-aniketos-2011},
year = {2011},
}