Generation of Transmission Control Rules Compliant with Existing Access Control Policies - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Generation of Transmission Control Rules Compliant with Existing Access Control Policies

Résumé

Access Control (AC) is a well known mechanism that allows access restriction to resources. Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party. To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. Unfortunately, these policies can contradict existing AC rules, leading to security leakage (i.e. a legitimate user is allowed to send a resource to someone who has no access rights in the AC). In this article, we aim at creating TC policies that are compliant with existing AC policies. To do so, we use a mapping mechanism that generates TC rules directly from existing AC policies. Thanks to the generated rules, our solution can make inferences to improve existing AC and enhance security knowledge between infrastructures.
Fichier principal
Vignette du fichier
paper_64_camready (1).pdf (919.82 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01318566 , version 1 (19-05-2016)

Identifiants

Citer

Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill. Generation of Transmission Control Rules Compliant with Existing Access Control Policies. Security and Privacy in Communication Networks (SECURECOMM 2015), Oct 2015, Dallas, United States. ⟨10.1007/978-3-319-28865-9_24⟩. ⟨hal-01318566⟩
106 Consultations
132 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More