Skip to Main content Skip to Navigation
Journal articles

Dynamic deployment of context-aware access control policies for constrained security devices

Abstract : Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identified based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., configuring, those security components and mechanisms so that the system behavior be finally the one specified by the policy. The deployment issue becomes more difficult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modifications introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action specification languages.
Document type :
Journal articles
Complete list of metadatas
Contributor : Bibliothèque Télécom Bretagne <>
Submitted on : Tuesday, July 19, 2011 - 1:14:20 PM
Last modification on : Wednesday, June 24, 2020 - 4:19:24 PM

Links full text



Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Laurent Toutain. Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, Elsevier, 2011, 84 (7), pp.1144 - 1159. ⟨10.1016/j.jss.2011.02.005⟩. ⟨hal-00609526⟩



Record views