Analysis and Comparison of Access Control Policies Validation Mechanisms

Full Text (PDF, 553KB), PP.54-69

Views: 0 Downloads: 0


Muhammad Aqib 1,* Riaz Ahmed Shaikh 1

1. Computer Science Department, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

* Corresponding author.


Received: 11 Jun. 2014 / Revised: 16 Aug. 2014 / Accepted: 11 Oct. 2014 / Published: 8 Dec. 2014

Index Terms

Access control, Inconsistency, Incompleteness, Policy Validation, Policy Verification


Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the researchers. However, comprehensive analysis and evaluation of the existing access control policy validation techniques is missing in the literature. In this paper, we have provided a first detailed survey of this domain and presented the taxonomy of the access control policy validation mechanisms. Furthermore, we have provided a qualitative comparison and trend analysis of the existing schemes. From this survey, we found that only few validation mechanisms exist that can handle both inconsistency and incompleteness problem. Also, most of the policy validation techniques are inefficient in handling continuous values and Boolean expressions.

Cite This Paper

Muhammad Aqib, Riaz Ahmed Shaikh, "Analysis and Comparison of Access Control Policies Validation Mechanisms", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.1, pp.54-69, 2015. DOI: 10.5815/ijcnis.2015.01.08


[1]Samarati P., Vimercati S.C. de, "Access Control: Policies, Models and Mechanisms", R. Focardi and R. Gorrieri (Eds.): FOSAD 2000, LNCS 2171, pp. 137–196, 2001.
[2]Wang Y., Zhang H., Dai X., Liu J., "Conflicts Analysis and Resolution for Access Control Policies", IEEE Int. Conf. on Information Theory and Information Security (ICITIS), 2010, pp. 264-267.
[3]Shaikh R.A., Adi K., Logrippo L., Mankovski S., "Inconsistency Detection Method for Access Control Policies", in Proc. of Sixth Int. Conf. on Information Assurance and Security, 2010, pp. 204-209.
[4]Shaikh R.A., Adi K., Logrippo L., Mankovski S., "Detecting Incompleteness in Access Control Policies using Data Classification Schemes", 5th Int. Conf. on Digital Information Management, 2010, pp. 417-422.
[5]Hwang J., Xie T., Hu V., Altunay M., "ACPT: A Tool for Modeling and Verifying Access Control Policies", IEEE International Symposium on Policies for Distributed Systems and Networks, 2010, pp. 40-43.
[6]Martin E., "Testing and Analysis of Access Control Policies", in Proc. of 29th Int. Conf. on Software Engineering, 2007. pp. 75-76.
[7]Mankai M., Logrippo L., "Access Control Policies: Modeling and Validation", in Proc. of the 5th NOTERE Conference, Canada, August 2005, pp. 85-91.
[8]Wu B., Chen X.n, Zjang Y., DAI Xiang-dong, "An Extensible Intra Access Control Policy Conflict Detection Algorithm",Int. Conf. on Computational Intelligence and Security, 2009, pp. 483-488.
[9]Vahid R. Karimi, Donald D. Cowan, "Verification of Access Control Policies for REA Business Processes", 33rd Annual IEEE Int.Computer Software and Application Conference, 2009, pp. 422-427.
[10]Ma J., Zhang D., Xu G., Yang Y., "Model Checking Based Security Policy Verification and Validation", 2nd Int. Workshop on Intelligent Systems & Applications, 2010, pp. 1-4.
[11]Mohan A., Blough D.M., Kurc T., Post A., Saltz J., "Detection of Conflicts and Inconsistencies in Taxonomy-based Authorization Policies", IEEE Int. Conf. on Bioinformatics and Biomedicine, 2011, pp. 590-594.
[12]Bernard Stepien, Stan Matwin, Amy Felty, "Strategies for Reducing Risks of Inconsistencies in Access Control Policies", Int. Conf. on Availability, Reliability and Security, IEEE, 2010, pp. 140-147.
[13]Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang, "Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems", Int. Joint Conference of IEEE TrustCom, 2011, pp. 250-257.
[14]Chao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si, "Inconsistency Management of Role Base Access Control Policy", Int. Conf. on E-Business and Information System Security, 2009, pp. 1-5.
[15]Abassi R., Fatmi S., "An Automated Validation Method for Security Policies: the firewall case", The 4th Int. Conf. on Information Assurance and Security, 2008, pp. 291-294.
[16]Loreto Bravo, James Cheney, Irini Fundulaki, "ACCOn: Checking Consistency of XML Write-Access Control Policies", In proc. of the 11th Int. Conf. on Extending Database Technology: Advances in Database Technology, EDBT, 2008, pp. 715-719.
[17]WU Jin-hua, CHEN Xiao-su, ZHAO Yi-zhu, NI Jun, "A Flexible Policy-Based Firewall Management Framework", Int. Conf. on Cyberworlds, 2008, pp. 192-194.
[18]Xu D., Thomas L., Kent M., Mouelhi T., Traon Y. L., "A Model-Based Approach to Automated Testing of Access Control Policies" SACMAT, 2012, pp. 209-218.
[19]Evan Martin, Tao Xie, "A Fault Model and Mutation Testing of Access Control Policies", Int. world Wide Web Conf. Committee, 2007, pp. 667-676.
[20]Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino, "A Framework for Verification and Optimal Reconfiguration of Event-driven Role Based Access Control Policies", SACMAT, 2012, pp. 197-208.
[21]Tekbacak F., Tuglular T., Kikenelli O., "An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies", 33rd IEEE Int. Computer Software and Application Conf., 2009, pp. 52-55.
[22]S. Murphy, G. Weber, M. Mendis, H. Chueh, S. Churchill, J. Glaser and I. Kohane, “Serving the enterprise and beyond with informatics for integrating biology and the bedside (i2b2),” journal of the American Medical Informatics Association, 17(2), 2010, pp. 124-130.
[23]Genrich, H.J. “Predicate/transition nets”. In Petri Nets: Central Models and Their Properties, Springer Berlin Heidelberg, 1987, pp. 207–247.
[24]Xu, D. and Nygard, K.E. “Threat-driven modeling and verification of secure software using aspect-oriented Petri nets”, IEEE Trans. on Software Engineering, 2006, vol. 32, no. 4, pp 265-278.
[25]Xu, D. “A tool for automated test code generation from high-level Petri nets”, In Proc. of Petri Nets’11, LNCS 6709, Newcastle upon Tyne, UK, June 2011, pp. 308-317.
[26]Xu, D., Tu, M., Sanford, M., Thomas, L., Woodraska, D., and Xu, W. “Automated security test generation with formal threat models” IEEE Trans. on Dependable and Secure Computing. In press, 9(4), pp. 526-540, 2012.
[27]J. R. Quinlan, “Induction of decision trees,” Mach. Learn, vol. 1, no. 1, pp. 81–106, March 1986.
[28]J. R. Quinlan, “C4.5: Programs for Machine Learning”. USA: Morgan Kaufmann Publishers, 1993.
[29]B. Cestnik, I. Kononenko, and I. Bratko, “Assistant 86: A knowledge elicitation tool for sophistical users,” in Proc. of the 2nd European Working Session on Learning, 1987, pp. 31–45.
[30]K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz, “Veri?cation and change-impact analysis of access-control policies,” in Proc. of the 27th Int. Conf. on Software engineering, NY, USA, 2005, pp. 196–205.
[31]M. G. Gouda and A. X. Liu, “Structured ?rewall design,” Computer Networks, vol. 51, no. 4, pp. 1106–1120, 2007.
[32]J. Catlett, “Megainduction: Machine learning on very large databases,” PhD Thesis, School of Computer Science, University of Technology, Sydney, Australia, 1991.
[33]A. Cimatti, E. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore, M. Roveri, R. Sebastiani, and A. Tacchella. “NuSMV Version 2: An OpenSource Tool for Symbolic Model Checking”. In Proc. of 14th Int. Conference on Computer Aided Veri?cation (CAV), 2002, pp. 359-364.
[34]D. Jackson, “ALLOY Home Page.” [Online]. Available:
[35]D. Jackson, Micromodels of Software: Lightweight Modelling and Analysis with ALLOY, Feb. 2002.
[36]D. Jackson, ALLOY 3.0 Reference Manual, May 2004.
[37]D. Jackson, I. Schechter, and H. Shlyahter, “Alcoa: the alloy constraint analyzer”, In proc. of the 22nd Int. Conf. on Software engineering. ACM Press, 2000, pp. 730–733.
[38]Robert Tarjan, “Depth-first search and linear graph algorithms”, In SIAM Journal on Computing, Vol. 1 (1972), No. 2, pp. 146-160.
[39]B.W. Lampson. “Protection”, In 5th Princeton Symposium on Information Science and Systems, 1971, pp. 437–443.
[40]G.S. Graham and P.J. Denning, “Protection principles and practice”, In AFIPS Press, editor, Proc. Spring Jt. Computer Conf., vol. 40, N.J., 1972, pp. 417–429.
[41]M.H. Harrison, W.L. Ruzzo, and J.D. Ullman, “Protection in operating systems”, Communications of the ACM, 1976, pp. 461–471.
[42]D.E. Denning. “A lattice model of secure information ?ow”, Communications of the ACM, Vol. 19, No. 5, May 1976, pp. 236–243.
[43]D.E. Bell and L.J. LaPadula, “Secure computer systems: Mathematical foundations”, Technical Report ESD-TR-278, vol. 1, The Mitre Corp., Bedford, MA, 1973.
[44]G. Ahn and R. Sandhu, “The RSL99 language for role-based separation of duty constraints”, In Proc. of the fourth ACM Workshop on Role-based Access Control, Fairfax, VA, USA, October 1999, pp. 43–54.
[45]T. Jaeger and A. Prakash, “Requirements of role-based access control for collaborative systems”, In Proc. of the ?rst ACM Workshop on Role-Based Access Control, Gaithersburg, MD, USA, November 1995.
[46]G. Lawrence, “The role of roles”, Computers and Security, Vol. 12, No. 1, 1993, pp. 15-21.
[47]C. Powers and M. Schunter, “Enterprise privacy authorization language (EPAL 1.2)”, W3C Member Submission, November 2003.
[48]F. Somenzi, “CUDD: The CU decision diagram package”,
[49]K. J. Biba, “Integrity considerations for secure computer systems”, Technical Report TR-3153, The Mitre Corporation, Bedford, MA, April 1977.
[50]T. Moses, “eXtensible Access Control Markup Language (XACML) version 1.0”, Technical report, OASIS, Feb. 2003.
[51]Mukkamala R., Kamisetty V., Yedugani P,, “Detecting and Resolving Misconfigurations in Role-Based Access Control”, ICISS 2009, pp. 318-325.
[52]Vaidya, J., Atluri, V., Guo, Q., “The Role-Mining Problem: Finding a Minimal Descriptive Set of Roles”, In proc. of 12th ACM Symp. on Access Control Models and Technologies, ACM Press, New York, 2007, pp. 175–184.
[53]Lujo Bauer, Scott Garriss, Michael K. Reiter, “Detecting and Resolving Policy Misconfigurations in Access-Control Systems”, ACM Transactions on Information and System Security (TISSEC) 14.1 (2011): 2.
[54]R. Agrawal and R. Srikant. “Fast algorithms for mining association rules”, In Proceedings 20th Int. Conf. on Very Large Data Bases, VLDB, 1994, pp. 487-49.
[55]Evan Martin and Tao Xie, “Inferring Access-Control Policy Properties via Machine Learning”, proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, 2006.
[56]I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 2005.
[57]Sun Microsystems. Sun’s XACML Implementation. Source-forge, 2005.
[58]Remi Delmas and Thomas Polacsek, “Formal Methods for Exchange Policy Specification”, CAiSE, 2013, pp. 288-303.
[59]Gallier, J.H., “Logic for Computer Science: Foundations of Automatic Theorem Proving”, ch. 10, pp. 448–476, Wiley, 1987.
[60]Lin, D., Rao, P., Bertino, E., Li, N., and Lobo, J. "EXAM: a comprehensive environment for the analysis of access control policies." International Journal of Information Security 9(4), 2010, pp. 253-273.
[61]Cau, A., Janicke, H., & Moszkowski, B. “Verification and enforcement of access control policies”. Formal Methods in System Design, 43(3), 2013, pp. 450-492.
[62]Bertolino, A., Marianne B., Said D., Francesca L., and Eda M., "A Toolchain for Designing and Testing Access Control Policies." In Engineering Secure Future Internet Services and Systems, pp. 266-286. Springer International Publishing, 2014.
[63]Aqib, M,. and Shaikh, R. A. "An Algorithm to Detect Inconsistencies in Access Control Policies ", Proc. of the Intl. Conf. on Advances In Computing, Communication and Information Technology (CCIT 2014), London, UK, June 2014, pp. 171 – 175.
[64]Hasani S. M., Modiri N., “Criteria Specifications for the Comparison and Evaluation of Access Control Models”, I.J. Computer Network and Information Security IJCNIS Vol. 5, No. 5, April 2013, pp. 19-29.