more generalized class of ABAC policies. To extend
our approach even further to the step of model im-
plementation, ongoing work focuses on the compiler-
automated translation of model specifications into
source code, and secure runtime environments for rig-
orously enforcing embedded policies within operating
system and application security architecture implemen-
tations.
REFERENCES
Amthor, P. (2016). The Entity Labeling Pattern for Modeling
Operating Systems Access Control. In E-Business and
Telecomm.: 12th Int. Joint Conf., ICETE 2015, Revised
Selected Papers, pages 270–292.
Amthor, P. (2017). Efficient Heuristic Safety Analysis of
Core-based Security Policies. In Proc. 14th Int. Conf.
on Secur. and Cryptogr., pages 384–392.
Amthor, P., K
¨
uhnhauser, W. E., and P
¨
olck, A. (2013). Heuris-
tic Safety Analysis of Access Control Models. In Proc.
18th ACM Symp. on Access Control Models and Tech-
nol., pages 137–148.
Amthor, P., K
¨
uhnhauser, W. E., and P
¨
olck, A. (2014).
WorSE: A Workbench for Model-based Security Engi-
neering. Comp. & Secur., 42(0):40–55.
Amthor, P. and Rabe, M. (2020). Command Dependencies
in Heuristic Safety Analysis of Access Control Models.
In Found. and Practice of Secur., vol. 12056 of LNCS,
pages 207–224.
Barker, S. (2009). The Next 700 Access Control Models or
a Unifying Meta-Model? In Proc. 14th ACM Symp. on
Access Control Models and Technol., pages 187–196.
Basin, D., Clavel, M., and Egea, M. (2011). A Decade of
Model-Driven Security. In Proc. 16th ACM Symp. on
Access Control Models and Technol., pages 1–10.
Calzavara, S., Rabitti, A., and Bugliesi, M. (2015). Compo-
sitional Typed Analysis of ARBAC Policies. In Proc.
IEEE 28th Comp. Secur. Found. Symp., pages 33–45.
Chakraborty, S., Sandhu, R., and Krishnan, R. (2020). On
the Feasibility of RBAC to ABAC Policy Mining: A
Formal Analysis. In Proc. 8th Int. Conf. on Sec. Knowl.
Managem. in Artific. Intell. Era, pages 147–163.
Dinh, K. K. Q., Tran, T. D., and Truong, A. (2017). Security
Analysis of Administrative Role-Based Access Control
Policies with Contextual Information. In Proc. 4th Int.
Conf. on Future Data and Secur. Eng., vol. 10646 of
LNCS, pages 243–261.
Fern
´
andez, M., Mackie, I., and Thuraisingham, B. (2019).
Specification and Analysis of ABAC Policies via the
Category-Based Metamodel. In Proc. 9th ACM Conf.
on Data and App. Secur. and Priv., pages 173–184.
Ferraiolo, D., Kuhn, D. R., and Chandramouli, R. (2007).
Role-Based Access Control. Artech House. Sec. Ed.,
ISBN 978-1-59693-113-8.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in Operating Systems. Comm. of the ACM,
19(8):461–471.
Jayaraman, K., Tripunitara, M., Ganesh, V., Rinard, M., and
Chapin, S. (2013). MOHAWK: Abstraction-Refinement
and Bound-Estimation for Verifying Access Control
Policies. ACM Trans. on Inform. and Syst. Secur.,
15(4):18:1–18:28.
Jha, S., Li, N., Tripunitara, M., Wang, Q., and Winsborough,
W. (2008). Towards Formal Verification of Role-Based
Access Control Policies. IEEE Trans. on Depend. Se-
cure Comp., 5:242–255.
Jin, X., Krishnan, R., and Sandhu, R. (2012a). A Unified
Attribute-Based Access Control Model Covering DAC,
MAC and RBAC. In Proc. 26th Ann. IFIP WG 11.3
Conf. on Data and App. Secur. and Priv., vol. 7371 of
LNCS, pages 41–55.
Jin, X., Sandhu, R., and Krishnan, R. (2012b). RABAC:
Role-Centric Attribute-Based Access Control In Proc.
6th Int. Conf. on Math. Methods, Models and Arch. for
Comp. Netw. Secur., vol. 7531 of LNCS, pages 84–96.
K
¨
uhnhauser, W. E. and P
¨
olck, A. (2011). Towards Access
Control Model Engineering. In Proc. 7th Int. Conf. on
Inform. Syst. Secur., pages 379–382.
Li, N. and Tripunitara, M. V. (2006). Security Analysis in
Role-Based Access Control. ACM Trans. on Inform.
and Syst. Secur., 9(4):391–420.
P
¨
olck, A. (2014). Small TCBs of Policy-controlled Operating
Systems. Universit
¨
atsverlag Ilmenau.
Ranise, S., Truong, A., and Armando, A. (2014). Scal-
able and Precise Automated Analysis of Administrative
Temporal Role-Based Access Control. In Proc. 19th
ACM Symp. on Access Control Models and Technol.,
pages 103–114.
Sandhu, R., Bhamidipati, V., and Munawer, Q. (1999). The
ARBAC97 Model for Role-based Administration of
Roles. ACM Trans. on Inf. Syst. Secur., 2(1):105–135.
Sandhu, R., Ferraiolo, D., and Kuhn, R. (2000). The NIST
Model for Role-Based Access Control: Towards a Uni-
fied Standard. In Proc. 5th ACM Workshop on Role-
Based Access Control, pages 47–63.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-Based Access Control Models.
IEEE Comp., 29(2):38–47.
Shahen, J., Niu, J., and Tripunitara, M. (2015). Mohawk+T:
Efficient Analysis of Administrative Temporal Role-
Based Access Control (ATRBAC) Policies. In Proc.
20th ACM Symp. on Access Control Models and Tech-
nol., pages 15–26.
Stoller, S. D., Yang, P., Gofman, M., and Ramakrishnan,
C. R. (2011). Symbolic Reachability Analysis for
Parameterized Administrative Role Based Access Con-
trol. Comp. & Secur., 30(2-3):148–164.
Stoller, S. D., Yang, P., Ramakrishnan, C. R., and Gofman,
M. I. (2007). Efficient Policy Analysis for Administra-
tive Role Based Access Control. In Proc. 14th ACM
Conf. Comp. & Comm. Secur., pages 445–455.
Tripunitara, M. V. and Li, N. (2007). A Theory for Compar-
ing the Expressive Power of Access Control Models.
Jour. of Comp. Secur., 15(2):231–272.
Vimercati, S. D. C. d., Samarati, P., and Jajodia, S. (2005).
Policies, Models, and Languages for Access Control.
In Proc. 4th Int. Conf. on Databases in Networked
Inform. Syst., vol. 3433/2005 of LNCS, pages 225–237.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
442