Invalidating policies using structural information

Florian Kammüller, Christian W. Probst

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    22 Citations (Scopus)
    7 Downloads (Pure)

    Abstract

    Insider threats are a major threat to many organisations. Even worse, insider attacks are usually hard to detect, especially if an attack is based on actions that the attacker has the right to perform. In this paper we present a step towards detecting the risk for this kind of attacks by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation’s policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control system or policies.
    Original languageEnglish
    Title of host publicationIEEE Security and Privacy Workshops (SPW 2013)
    Place of PublicationLos Alamitos, CA, USA
    PublisherIEEE Computer Society
    Pages76-81
    Number of pages6
    ISBN (Print)978-1-4799-0458-7
    DOIs
    Publication statusPublished - May 2013
    EventIEEE Security and Privacy Workshops, SPW 2013 - San Francisco, United States
    Duration: 23 May 201324 May 2013

    Workshop

    WorkshopIEEE Security and Privacy Workshops, SPW 2013
    CountryUnited States
    CitySan Francisco
    Period23/05/1324/05/13

    Keywords

    • EC Grant Agreement nr.: FP7/2007-2013
    • EC Grant Agreement nr.: FP7/318003
    • Policies
    • Insider threats
    • Formal methods

    Fingerprint Dive into the research topics of 'Invalidating policies using structural information'. Together they form a unique fingerprint.

  • Cite this

    Kammüller, F., & Probst, C. W. (2013). Invalidating policies using structural information. In IEEE Security and Privacy Workshops (SPW 2013) (pp. 76-81). Los Alamitos, CA, USA: IEEE Computer Society. https://doi.org/10.1109/SPW.2013.36