Analyzing Access Control Overrides

By Achim D. Brucker and Helmut Petritsch.

Dynamic access control systems that allow users, e.g., in emergency situations, to overwrite access control restrictions. Systems supporting dynamic access control rely, in general, on a post-hoc analysis for assessing the overrides.

In this talk, we present a framework that makes is possible to support such assessment activities in particular and system audits in general. Moreover the present framework supports also security engineers in writing and debugging security policies.

Please cite this work as follows:
A. D. Brucker and H. Petritsch, “Analyzing access control overrides,” presented at the PoFI 2011, Pisa, Italy, Sep. 21, 2010. Author copy: http://logicalhacking.com/publications/talk-brucker.ea-aniketos-2011/

BibTeX
@Unpublished{ talk:brucker.ea:aniketos:2011,
  date       = {2010-09-21},
  author     = {Achim D. Brucker and Helmut Petritsch},
  title      = {Analyzing Access Control Overrides},
  eventtitle = {{PoFI} 2011},
  venue      = {Pisa, Italy},
  language   = {USenglish},
  abstract   = {Dynamic access control systems that allow users, e.g., in
                emergency situations, to overwrite access control
                restrictions. Systems supporting dynamic access control rely,
                in general, on a post-hoc analysis for assessing the
                overrides.
                
                In this talk, we present a framework that makes is possible to
                support such assessment activities in particular and system
                audits in general. Moreover the present framework supports
                also security engineers in writing and debugging security
                policies.},
  note       = {Author copy: \url{http://logicalhacking.com/publications/talk-brucker.ea-aniketos-2011/}},
}