ACKNOWLEDGEMENTS
Authors acknowledge support from the EC Frame-
work Program, under the PANOPTESEC project (GA
610416), as well as Spanish Ministry of Science
and Innovation (project TIN2011-27076-C03-02 CO-
PRIVACY).
REFERENCES
Abou-El-Kalam, A., Baida, R., Balbiani, P., Benferhat, S.,
Cuppens, F., Deswarte, Y., Mi
`
ege, A., Saurel, C.,
and Trouessin, G. (2003). Organization Based Ac-
cess Control. In IEEE 4th International Workshop on
Policies for Distributed Systems and Networks (Policy
2003), pages 120–131. IEEE Computer Society.
Badger, L., Sterne, D. F., Sherman, D. L., and Walker, K. M.
(1996). A domain and type enforcement UNIX proto-
type. Computing Systems, 9(1):47–83.
Badger, L., Sterne, D. F., Sherman, D. L., Walker, K. M.,
and Haghighat, S. A. (1995). Practical domain and
type enforcement for UNIX. In Security and Privacy,
1995. Proceedings., 1995 IEEE Symposium on, pages
66–77. IEEE.
Beckerle, M. and Martucci, L. A. (2013). Formal Defini-
tions for Usable Access Control Rule Sets From Goals
to Metrics. In Ninth Symposium on Usable Privacy
and Security (SOUPS 2013), pages 1–11. ACM.
Belhaouane, M., Debar, H., and Garcia-Alfaro, J. (Last
Access: 2015). Evaluating the Complexity of Ac-
cess Control Policies Using Quantitative Metrics –
SELinux Testbed Repository (Appendix). [On-line].
Available at https://github.com/met-testbeds/selinux.
Colantonio, A., Pietro, R. D., Ocello, A., and Verde, N. V.
(2010). Taming role mining complexity in RBAC.
Computers & Security, 29(5):548–564.
Cuppens, F., Cuppens-Boulahia, N., and Ben Ghorbel, M.
(2007). High Level Conflict Management Strategies in
Advanced Access Control Models. Electronic Notes
in Theoretical Computer Science, 186:3–26.
Garcia-Alfaro, J., Boulahia-Cuppens, N., and Cuppens, F.
(2008). Complete analysis of configuration rules to
guarantee reliable network security policies. Int. J.
Inf. Sec., 7(2):103–122.
Garcia-Alfaro, J., Cuppens, F., and Cuppens-Boulahia, N.
(2006). Analysis of policy anomalies on distributed
network security setups. In Computer Security - ES-
ORICS 2006, 11th European Symposium on Research
in Computer Security, Hamburg, Germany, September
18-20, 2006, Proceedings, pages 496–511.
Garcia-Alfaro, J., Cuppens, F., and Cuppens-Boulahia, N.
(2007). Management of Exceptions on Access Con-
trol Policies. In 22nd IFIP TC-11 International Infor-
mation Security Conference (IFIP SEC 2007), pages
97–108.
Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N.,
Mart
´
ınez Perez, S., and Cabot, J. (2013). Manage-
ment of stateful firewall misconfiguration. Computers
& Security, 39:64–85.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in operating systems. Commun. ACM,
19(8):461–471.
Jaeger, T. (2001). Managing Access Control Complex-
ity Using Metrics. In Sixth ACM Symposium on Ac-
cess Control Models and Technologies (SACMAT-01),
pages 131–152.
Kateb, D. E., Mouelhi, T., Traon, Y. L., Hwang, J., and Xie,
T. (2012). Refactoring access control policies for per-
formance improvement. In Third Joint WOSP/SIPEW
International Conference on Performance Engineer-
ing, ICPE’12, Boston, MA, USA - April 22 - 25, 2012,
pages 323–334.
Lampson, B. W. (1969). Dynamic protection structures. In
AFIPS Fall Joint Computing Conference, pages 27–
38.
Lampson, B. W. (1974). Protection. Operating Systems
Review, 8(1):18–24.
Lil CMS — The Easiest Content Management System (Last
Access: 2014). Available at http://www.lilcms.com/.
Martin, E., Xie, T., and Yu, T. (2006). Defining and Measur-
ing Policy Coverage in Testing Access Control Poli-
cies. In 2006 International Conference on Informa-
tion and Communications Security (ICICS ’06), pages
139–158. Springer.
Mayer, F., MacMillan, K., and Caplan, D. (2006). SELinux
by Example: Using Security Enhanced Linux (Pren-
tice Hall Open Source Software Development Series).
Prentice Hall PTR, Upper Saddle River, NJ, USA.
McCarty, B. (2004). SELinux: NSA’s Open Source Security
Enhanced Linux. O’Reilly Media, Inc.
Miller, G. A. (1956). The magical number seven, plus or
minus two: some limits on our capacity for processing
information. Psychological Review, 63:81–97.
Samarati, P. and De Capitani di Vimercati, S. (2000). Ac-
cess control: Policies, models, and mechanisms. In
FOSAD, pages 137–196.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. IEEE
Computer, 29(2):38–47.
The Drupal project (Last Access: 2015). Available at
http://drupal.org/.
Vaidya, J., Atluri, V., and Guo, Q. (2010). The role mining
problem: A formal perspective. ACM Trans. Inf. Syst.
Secur., 13(3).
Wordpress Web Site (Last Access: 2015). Available at
http://wordpress.com/.
Yuan, E. and Tong, J. (2005). Attributed Based Access Con-
trol (ABAC) for Web Services. In 2005 IEEE Interna-
tional Conference on Web Services, pages 561–569.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
64