
By Achim D. Brucker and Helmut Petritsch.
Dynamic access control systems that allow users, e.g., in emergency situations, to overwrite access control restrictions. Systems supporting dynamic access control rely, in general, on a post-hoc analysis for assessing the overrides.
In this talk, we present a framework that makes is possible to support such assessment activities in particular and system audits in general. Moreover the present framework supports also security engineers in writing and debugging security policies.
Please cite this work as follows: A. D. Brucker and H. Petritsch, “Analyzing access control overrides,” presented at the PoFI 2011, Pisa, Italy, Sep. 21, 2010. Author copy: http://logicalhacking.com/publications/talk-brucker.ea-aniketos-2011/
@Unpublished{ talk:brucker.ea:aniketos:2011,
date = {2010-09-21},
author = {Achim D. Brucker and Helmut Petritsch},
title = {Analyzing Access Control Overrides},
eventtitle = {{PoFI} 2011},
venue = {Pisa, Italy},
language = {USenglish},
abstract = {Dynamic access control systems that allow users, e.g., in
emergency situations, to overwrite access control
restrictions. Systems supporting dynamic access control rely,
in general, on a post-hoc analysis for assessing the
overrides.
In this talk, we present a framework that makes is possible to
support such assessment activities in particular and system
audits in general. Moreover the present framework supports
also security engineers in writing and debugging security
policies.},note = {Author copy: \url{http://logicalhacking.com/publications/talk-brucker.ea-aniketos-2011/}},
}