S = { s1 , s2 };
UA = { [u1 , r1 ], [ u1 , r2] , [u2 , r1 ] };
user = { s1 : u1 , s2 : u2 };
Listing 9: Examples of
set
,
relation
and
mapping
component value assigments used in
initial-state
and
extension-tuple sections.
del components of types
set
,
relation
and
mapping
.
Complementary to the
state-space
and
initial-state
, in the
extension-tuple
section,
all static model components are listed and initialized.
3.3 Tool Support
With the DYNAMO specification language, we aim
for uniform language support across the MSPE steps
model engineering, model analysis, and model imple-
mentation. In order that a specification in DYNAMO
is effectively usable, tool support in form of compilers
is required, which automate (1.) plausibility and type
checking to detect specification errors, (2.) generation
of a intermediate language representation for existing
model analysis tools, and (3.) source code generation
for machine-executable model implementations.
As a first proof-of-concept, we implemented two
compilers. First, a DYNAMO-to-XML compiler is
able to generate an intermediate XML-based model
representation which is compatible with our dynamic
model analysis tool (Amthor et al., 2014). Second,
a DYNAMO-to-C++ compiler enables an automated
generation of an algorithmic model representations
in C++ and all functionality necessary for its runtime
based on a layered approach.
4 CONCLUSIONS
This paper discusses language foundations for model-
based engineering of security policies. Considering
the critical and error-prone nature of translating model
specifications between the MSPE steps, we argue that
MSPE requires holistic specification language and tool
support. Towards this goal we present REAP, a visual
specification language for formalizing security poli-
cies in model engineering, and DYNAMO, a textual
specification language enabling model engineering,
model analysis and model implementation of dynamic
security models. We already tested both languages by
proof-of-concept tools.
We consider the work in this paper a first step:
Ongoing work focuses on evaluating the methodol-
ogy within a use case study comprising a real-world
security policy, enabling support for further classes
of security models in REAP and DYNAMO such as
information flow or non-interference models, and se-
cure runtime environments for rigorously enforcing
compiler-generated executable model representations
within security architecture implementations.
REFERENCES
Amthor, P. (2016). The Entity Labeling Pattern for Modeling
Operating Systems Access Control. In E-Business and
Telecomm.: 12th Int. Joint Conf., ICETE 2015, Revised
Selected Papers, pages 270–292.
Amthor, P., K
¨
uhnhauser, W. E., and P
¨
olck, A. (2014).
WorSE: A Workbench for Model-based Security Engi-
neering. Comp. & Secur., 42(0):40–55.
Basin, D., Clavel, M., and Egea, M. (2011). A Decade of
Model-Driven Security. In Proc. 16th ACM Symp. on
Access Control Models and Technol., pages 1–10.
Ben Fadhel, A., Bianculli, D., and Briand, L. (2016).
GemRBAC-DSL: A High-level Specification Lan-
guage for Role-based Access Control Policies. In Proc.
21st ACM Symp. on Access Control Models and Tech-
nol., pages 179–190.
Crampton, J. and Morisset, C. (2012). PTaCL: A Language
for Attribute-Based Access Control in Open Systems.
In Principles of Secur. and Trust: POST 2012, vol.
7215 of LNCS, pages 390–409.
Ferraiolo, D., Kuhn, D. R., and Chandramouli, R. (2007).
Role-Based Access Control. Artech House. Sec. Ed.,
ISBN 978-1-59693-113-8.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in Operating Systems. Comm. of the ACM,
19(8):461–471.
Jin, X., Krishnan, R., and Sandhu, R. (2012). A Unified
Attribute-Based Access Control Model Covering DAC,
MAC and RBAC. In Data and App. Secur. and Priv.
XXVI, vol. 7371 of LNCS, pages 41–55.
Mitra, B., Sural, S., Vaidya, J., and Atluri, V. (2016). A
Survey of Role Mining. ACM Comput. Surv., 48(4).
OASIS (2013). eXtensible Access Control Markup Lan-
guage (XACML) Version 3.0. OASIS Standard.
Sandhu, R. S. (1992). The Typed Access Matrix Model.
In Proc. 1992 IEEE Symp. on Secur. and Priv., pages
122–136.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-Based Access Control Models.
IEEE Comp., 29(2):38–47.
Schlegel, M. and Amthor, P. (2020). Beyond Administration:
A Modeling Scheme Supporting the Dynamic Analysis
of Role-based Access Control Policies. In Proc. 17th
Int. Conf. on Secur. and Cryptogr., to appear.
Servos, D. and Osborn, S. L. (2017). Current Research
and Open Problems in Attribute-Based Access Control.
ACM Comput. Surv., 49(4):65:1–65:45.
Stoller, S. D., Yang, P., Ramakrishnan, C. R., and Gofman,
M. I. (2007). Efficient Policy Analysis for Administra-
tive Role Based Access Control. In Proc. 14th ACM
Conf. on Comp. and Comm. Secur., pages 445–455.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
520