This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2013 IEEE Security and Privacy Workshops
Invalidating Policies using Structural Information
San Francisco, CA, USA USA
May 23-May 24
ISBN: 978-1-4799-0458-7
Insider threats are a major threat to many or- ganisations. Even worse, insider attacks are usually hard to detect, especially if an attack is based on actions that the attacker has the right to perform. In this paper we present a step towards detecting the risk for this kind of attacks by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation's policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control system or policies.
Index Terms:
formal methods,Insider threats,policies
Citation:
Florian Kammuller, Christian W. Probst, "Invalidating Policies using Structural Information," spw, pp.76-81, 2013 IEEE Security and Privacy Workshops, 2013
Usage of this product signifies your acceptance of the Terms of Use.