On the Design and Testing of Authorization Systems
Authorization deals with the specification and management of accesses principals have to resources. In the design of an authorization system, sometimes we just implement the accessenforcement without having a precise semantics for it. In this dissertation we show that, there exists a precise semantic...
Main Author: | |
---|---|
Language: | en |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10012/7673 |
id |
ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-7673 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-76732013-08-03T07:33:58ZSharifi, Alireza2013-08-02T13:04:12Z2013-08-02T13:04:12Z2013-08-02T13:04:12Z2013http://hdl.handle.net/10012/7673Authorization deals with the specification and management of accesses principals have to resources. In the design of an authorization system, sometimes we just implement the accessenforcement without having a precise semantics for it. In this dissertation we show that, there exists a precise semantics that improves the efficiency of access-enforcement over the accessenforcement without precise semantics. We present an algorithm to produce an Access Control List (ACL), in a particular authorization system for version control syatems called gitolite, and we compare the implementation of our algorithm against the implementation that is already being used. As another design problem, we consider least-restrictive enforcement of the Chinese Wall security policy. We show that there exists a least-restrictive enforcement of the Chinese Wall Security Policy. Our approach to proving the thesis is by construction; we present an enforcement that is least-restrictive. We also prove that such an enforcement mechanism cannot be subjectindependent. We also propose a methodology that tests the implementation of an authorization system to check whether it has properties of interest. The properties may be considered to be held in the design of an authorization system, but they are not held in the implementation. We show that there exist authorization systems that do not have the properties of interest.enAuthorization SystemsDesignOn the Design and Testing of Authorization SystemsThesis or DissertationElectrical and Computer EngineeringDoctor of PhilosophyElectrical and Computer Engineering (Software Engineering) |
collection |
NDLTD |
language |
en |
sources |
NDLTD |
topic |
Authorization Systems Design Electrical and Computer Engineering (Software Engineering) |
spellingShingle |
Authorization Systems Design Electrical and Computer Engineering (Software Engineering) Sharifi, Alireza On the Design and Testing of Authorization Systems |
description |
Authorization deals with the specification and management of accesses principals have to resources. In the design of an authorization system, sometimes we just implement the accessenforcement without having a precise semantics for it. In this dissertation we show that, there
exists a precise semantics that improves the efficiency of access-enforcement over the accessenforcement without precise semantics. We present an algorithm to produce an Access Control
List (ACL), in a particular authorization system for version control syatems called gitolite,
and we compare the implementation of our algorithm against the implementation that is already
being used.
As another design problem, we consider least-restrictive enforcement of the Chinese Wall
security policy. We show that there exists a least-restrictive enforcement of the Chinese Wall
Security Policy. Our approach to proving the thesis is by construction; we present an enforcement
that is least-restrictive. We also prove that such an enforcement mechanism cannot be subjectindependent.
We also propose a methodology that tests the implementation of an authorization system to
check whether it has properties of interest. The properties may be considered to be held in the
design of an authorization system, but they are not held in the implementation. We show that
there exist authorization systems that do not have the properties of interest. |
author |
Sharifi, Alireza |
author_facet |
Sharifi, Alireza |
author_sort |
Sharifi, Alireza |
title |
On the Design and Testing of Authorization Systems |
title_short |
On the Design and Testing of Authorization Systems |
title_full |
On the Design and Testing of Authorization Systems |
title_fullStr |
On the Design and Testing of Authorization Systems |
title_full_unstemmed |
On the Design and Testing of Authorization Systems |
title_sort |
on the design and testing of authorization systems |
publishDate |
2013 |
url |
http://hdl.handle.net/10012/7673 |
work_keys_str_mv |
AT sharifialireza onthedesignandtestingofauthorizationsystems |
_version_ |
1716595427039510528 |