Strengthening the Foundations of Access Control
加强访问控制的基础
基本信息
- 批准号:RGPIN-2014-06716
- 负责人:
- 金额:$ 2.84万
- 依托单位:
- 依托单位国家:加拿大
- 项目类别:Discovery Grants Program - Individual
- 财政年份:2018
- 资助国家:加拿大
- 起止时间:2018-01-01 至 2019-12-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Access control comprises the techniques and mechanisms by which we ensure that only authorized principals are able to perform certain actions, such as read and write, on resources. It is an essential component of the security of deployed systems, and is also an active area of research. From the PI's experience over the past few years, which includes collaborative research with industry, he has learned that the foundations of access control need considerable work. This is the focus of this proposal. The proposed research fits into the PI's longer term vision of making computer systems, on which all of us increasingly rely for even our basic needs, as secure as is feasible.**The PI proposes to address three fundamental topics. One is forensics, with which we answer questions about past states of a system. Forensics is important because preventive security techniques often fail. Access control systems are an important context in which to perform forensic analysis; however, the forensic analysis problem has not been posed as such in prior research. The PI proposes to precisely pose and investigate a broad class of forensic analysis problems in the context of access control. One of the outcomes of this work will be goal-directed logging, so only essential logs are maintained that lend to efficient analysis. A second topic that the PI proposes to research is the secrecy resilience of authorization policies. Authorization policies are themselves resources that need to be protected because portions of them (e.g., whether a user has a certain privilege) may be sensitive to disclosure. The central question that the PI proposes to answer in this context is: are some authorization policies inherently more secrecy resilient than others? The PI proposes to evolve a notion of secrecy resilience that has intuitive appeal, and explore several research directions, such as whether it is possible to increase the secrecy resilience of a policy without changing its effective authorizations, and whether one can build Role-Based Access Control (RBAC) policies that have a desired secrecy resilience. The third topic that the PI proposes to research is the foundations of testing implementations of authorization and access control systems. This is a topic on which the PI has conducted some recent work in collaboration with industry partners. There are several research problems that the PI proposes to address in this context. One is the identification and development of an appropriate syntax and associated semantics to express authorization systems for the purpose of testing, and the properties for which we would like to test. Another is a theory that relates such declarative properties with procedural traces, instances of which are to be exercised on the system under test. The PI proposes also to develop techniques for automatically generating trace instances using existing tools such as model checkers, and tying that to the process of exercising the trace instances. All of this work will result in a complete testing ecosystem for real world authorization and access control systems.**The proposed research is of value to Canada, and will complement the PI's other research, including those he performs in collaboration with industry partners. It will be high-impact in three ways. It will train Highly Qualified Personnel (HQP) in the important area of computer security, it will result in high-quality research publications in prestigious and selective journals and conferences, which in turn will give graduate students valuable exposure to the larger research community, and it will provide the PI and other researchers greater avenues to form research collaborations with Canadian industry partners by way of applying the proposed work to their real world problems.
访问控制包括技术和机制,通过这些技术和机制,我们确保只有授权的主体才能对资源执行某些操作,例如读取和写入。它是部署系统安全的重要组成部分,也是一个活跃的研究领域。从PI过去几年的经验中,包括与工业界的合作研究,他了解到访问控制的基础需要大量的工作。这是本提案的重点。拟议的研究符合PI的长期愿景,即使计算机系统尽可能安全,因为我们所有人都越来越依赖计算机系统来满足我们的基本需求。PI建议解决三个基本问题。一个是取证,我们用它来回答关于系统过去状态的问题。取证很重要,因为预防性安全技术经常失败。访问控制系统是执行取证分析的重要背景;然而,取证分析问题在之前的研究中尚未被提出。PI建议在访问控制的背景下精确地提出并调查广泛的取证分析问题。这项工作的成果之一将是目标导向的日志记录,因此只维护有助于有效分析的基本日志。PI建议研究的第二个主题是授权策略的保密弹性。授权策略本身是需要保护的资源,因为它们的一部分(例如,用户是否具有某种特权)可能对公开敏感。PI在此背景下提出要回答的中心问题是:某些授权策略是否天生就比其他策略具有更强的保密弹性?PI提出了一种具有直观吸引力的保密弹性概念,并探索了几个研究方向,例如是否有可能在不改变其有效授权的情况下增加策略的保密弹性,以及是否可以构建具有所需保密弹性的基于角色的访问控制(RBAC)策略。PI建议研究的第三个主题是授权和访问控制系统测试实现的基础。这是PI最近与行业合作伙伴合作开展的一些工作的主题。有几个研究问题,PI建议在这种情况下解决。一个是识别和开发适当的语法和相关的语义,以表达用于测试的授权系统,以及我们想要测试的属性。另一种理论是将这种声明性属性与过程跟踪联系起来,其中的实例将在被测系统上执行。PI还建议开发使用现有工具(如模型检查器)自动生成跟踪实例的技术,并将其与跟踪实例的执行过程联系起来。所有这些工作将为真实的世界授权和访问控制系统提供完整的测试生态系统。**拟议的研究对加拿大有价值,并将补充PI的其他研究,包括他与行业合作伙伴合作进行的研究。它将在三个方面产生重大影响。它将在计算机安全的重要领域培养高素质人才(HQP),它将导致高质量的研究出版物在著名的和选择性的期刊和会议,这反过来又将使研究生有价值的接触到更大的研究社区,它将为PI和其他研究人员提供更大的途径,通过应用拟议的工作与加拿大工业伙伴建立研究合作他们的真实的世界问题。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Tripunitara, Mahesh其他文献
Tripunitara, Mahesh的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Tripunitara, Mahesh', 18)}}的其他基金
Trust, in an Internet of Things
物联网中的信任
- 批准号:
RGPIN-2019-05634 - 财政年份:2022
- 资助金额:
$ 2.84万 - 项目类别:
Discovery Grants Program - Individual
Trust, in an Internet of Things
物联网中的信任
- 批准号:
RGPIN-2019-05634 - 财政年份:2021
- 资助金额:
$ 2.84万 - 项目类别:
Discovery Grants Program - Individual
Software Dependability for 5G Systems
5G 系统的软件可靠性
- 批准号:
532264-2018 - 财政年份:2021
- 资助金额:
$ 2.84万 - 项目类别:
Collaborative Research and Development Grants
Software Dependability for 5G Systems
5G 系统的软件可靠性
- 批准号:
532264-2018 - 财政年份:2020
- 资助金额:
$ 2.84万 - 项目类别:
Collaborative Research and Development Grants
Trust, in an Internet of Things
物联网中的信任
- 批准号:
RGPIN-2019-05634 - 财政年份:2020
- 资助金额:
$ 2.84万 - 项目类别:
Discovery Grants Program - Individual
Software Dependability for 5G Systems
5G 系统的软件可靠性
- 批准号:
532264-2018 - 财政年份:2019
- 资助金额:
$ 2.84万 - 项目类别:
Collaborative Research and Development Grants
Trust, in an Internet of Things
物联网中的信任
- 批准号:
RGPIN-2019-05634 - 财政年份:2019
- 资助金额:
$ 2.84万 - 项目类别:
Discovery Grants Program - Individual
Software Dependability for 5G Systems**********
5G 系统的软件可靠性************
- 批准号:
532264-2018 - 财政年份:2018
- 资助金额:
$ 2.84万 - 项目类别:
Collaborative Research and Development Grants
Automated Security Testing of an Electronic Asset Transfer Platform
电子资产转移平台的自动化安全测试
- 批准号:
516011-2017 - 财政年份:2017
- 资助金额:
$ 2.84万 - 项目类别:
Engage Grants Program
Strengthening the Foundations of Access Control
加强访问控制的基础
- 批准号:
RGPIN-2014-06716 - 财政年份:2017
- 资助金额:
$ 2.84万 - 项目类别:
Discovery Grants Program - Individual
相似海外基金
Collaborative Research: AF: Medium: Foundations of Oblivious Reconfigurable Networks
合作研究:AF:媒介:遗忘可重构网络的基础
- 批准号:
2402851 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Continuing Grant
Conference: Theory and Foundations of Statistics in the Era of Big Data
会议:大数据时代的统计学理论与基础
- 批准号:
2403813 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Standard Grant
Social Foundations of Cryptography
密码学的社会基础
- 批准号:
EP/X017524/1 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Research Grant
Mathematical Foundations of Intelligence: An "Erlangen Programme" for AI
智能的数学基础:人工智能的“埃尔兰根计划”
- 批准号:
EP/Y028872/1 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Research Grant
SAFER - Secure Foundations: Verified Systems Software Above Full-Scale Integrated Semantics
SAFER - 安全基础:高于全面集成语义的经过验证的系统软件
- 批准号:
EP/Y035976/1 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Research Grant
Statistical Foundations for Detecting Anomalous Structure in Stream Settings (DASS)
检测流设置中的异常结构的统计基础 (DASS)
- 批准号:
EP/Z531327/1 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Research Grant
Social foundations of cryptography
密码学的社会基础
- 批准号:
EP/X016226/1 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Research Grant
Foundations of Classical and Quantum Verifiable Computing
经典和量子可验证计算的基础
- 批准号:
MR/X023583/1 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Fellowship
CAREER: Statistical foundations of particle tracking and trajectory inference
职业:粒子跟踪和轨迹推断的统计基础
- 批准号:
2339829 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Continuing Grant
CAREER: Architectural Foundations for Practical Privacy-Preserving Computation
职业:实用隐私保护计算的架构基础
- 批准号:
2340137 - 财政年份:2024
- 资助金额:
$ 2.84万 - 项目类别:
Continuing Grant