(2.) We are extending developer support: By enabling
compiler-supported code generation of policy and pol-
icy runtime environments (TPSs) from policy repre-
sentations in domain-specific languages (Amthor and
Schlegel, 2020), we aim to embed our approach into
model-based security policy engineering workflows.
REFERENCES
Alam, M., Zhang, X., Khan, K., and Ali, G. (2011). xDAuth:
A Scalable and Lightweight Framework for Cross Do-
main Access Control and Delegation. In SACMAT ’11,
pages 31–40.
Amthor, P. and Schlegel, M. (2020). Towards Language
Support for Model-based Security Policy Engineering.
In SECRYPT ’20, pages 513–521.
Anderson, J. P. (1972). Computer Security Technology Plan-
ning Study. Tech. Rep. ESD-TR-73-51, Vol. II.
Bezawada, B., Haefner, K., and Ray, I. (2018). Securing
Home IoT Environments with Attribute-Based Access
Control. In ABAC ’18, pages 43–53.
Bhatti, R., Ghafoor, A., Bertino, E., and Joshi, J. B. D.
(2005). X-GTRBAC: An XML-based Policy Specifica-
tion Framework and Architecture for Enterprise-wide
Access Control. TISSEC, 8(2):187–227.
Biswas, P., Sandhu, R., and Krishnan, R. (2016). Label-
Based Access Control: An ABAC Model with Enu-
merated Authorization Policy. In ABAC ’16, pages
1–12.
Bonatti, P. A., De Capitani di Vimercati, S., and Pierangela,
S. (2002). An Algebra for Composing Access Control
Policies. TISSEC, 5(1):1–35.
Carter, J. (2007). Using GConf as an Example of How to
Create an Userspace Object Manager. In SEinux Symp.
’07.
Chen, J., Shang, W., Hassan, A. E., Wang, Y., and Lin,
J. (2019). An Experience Report of Generating Load
Tests Using Log-recovered Workloads at Varying Gran-
ularities of User Behaviour. In ASE ’19.
Crampton, J., Gutin, G., and Watrigant, R. (2016). Resiliency
Policies in Access Control Revisited. In SACMAT ’16,
pages 101–111.
Ferraiolo, D., Kuhn, D. R., and Chandramouli, R. (2007).
Role-Based Access Control. Artech House. Sec. Ed.
Ferraiolo, D. F., Chandramouli, R., Kuhn, R., and Hu,
V. C. (2016). Extensible Access Control Markup Lan-
guage (XACML) and Next Generation Access Control
(NGAC). In ABAC ’16, pages 13–24.
Ferraiolo, D. F., Gavrila, S. I., and Jansen, W. (2015). Policy
Machine: Features, Architecture, and Specification.
Tech. Rep. NISTIR 7987 Rev 1.
Fong, P. W. L. (2011). Relationship-Based Access Control:
Protection Model and Policy Language. In CODASPY
’11, pages 191–202.
Gupta, M., Patwa, F., and Sandhu, R. (2018). An Attribute-
Based Access Control Model for Secure Big Data Pro-
cessing in Hadoop Ecosystem. In ABAC ’18, pages
13–24.
Hipp, D. R., Kennedy, D., and Mistachkin, J. (2020). SQLite
Version 3.32.3. https://www.sqlite.org/src/info/7ebdfa
80be8e8e73.
Hsu, A. C. and Ray, I. (2016). Specification and Enforcement
of Location-Aware Attribute-Based Access Control for
Online Social Networks. In ABAC ’16, pages 25–34.
IBM (2016). Db2 11.1 – Label-based Access Control
Overview. https://www.ibm.com/support/knowledgec
enter/en/SSEPGG 11.1.0/com.ibm.db2.luw.admin.se
c.doc/doc/c0021114.html.
Intel Corporation (2019). Intel
®
SGX SDK for Linux* OS –
Developer Reference. https://download.01.org/intel-
sgx/sgx-linux/2.7.1/docs/Intel SGX Developer Refer
ence Linux 2.7.1 Open Source.pdf.
Intel Corporation (2021). Intel
®
Software Guard Extensions.
https://software.intel.com/en-us/sgx.
Jin, X., Krishnan, R., and Sandhu, R. S. (2012). A Unified
Attribute-Based Access Control Model Covering DAC,
MAC and RBAC. In DBSec ’12, pages 41–55.
Johnson, S., Zimmerman, D., and B., D. (2016). Intel
®
SGX: Debug, Production, Pre-release. https://software
.intel.com/en-us/blogs/2016/01/07/intel-sgx-debug-
production-prelease-whats-the-difference.
Loscocco, P. A. and Smalley, S. D. (2001). Integrating
Flexible Support for Security Policies into the Linux
Operating System. In ATC ’01, pages 29–42.
MacMillan, K., Brindle, J., Mayer, F., Caplan, D., and Tang,
J. (2006). Design and Implementation of the SELinux
Policy Management Server. In SELinux Symp. ’06.
Ni, Q., Bertino, E., and Lobo, J. (2010). Risk-Based Ac-
cess Control Systems Built on Fuzzy Inferences. In
AsiaCCS ’10, pages 250–260.
OpenMRS Inc. (2021a). OpenMRS. https://openmrs.org.
OpenMRS Inc. (2021b). OpenMRS Demo Data. https:
//wiki.openmrs.org/display/RES/Demo+Data.
Oracle (2018). Oracle Label Security Administrator’s Guide,
18c. https://docs.oracle.com/en/database/oracle/oracle-
database/18/olsag/index.html.
Rizvi, S. Z. R., Fong, P. W., Crampton, J., and Sellwood,
J. (2015). Relationship-Based Access Control for an
Open-Source Medical Records System. In SACMAT
’15, pages 113–124.
Schlegel, M. and Amthor, P. (2020). Beyond Administration:
A Modeling Scheme Supporting the Dynamic Analysis
of Role-based Access Control Policies. In SECRYPT
’20, pages 431–442.
Schlegel, M. and Amthor, P. (2021). The Missing Piece of
the ABAC Puzzle: A Modeling Scheme for Dynamic
Analysis. In SECRYPT ’21.
Shebaro, B., Oluwatimi, O., and Bertino, E. (2014). Context-
based Access Control Systems for Mobile Devices.
TDSC, 12(2):150–163.
Shu, R., Wang, P., Gorski III, S. A., Andow, B., Nadkarni, A.,
Deshotels, L., Gionta, J., Enck, W., and Gu, X. (2016).
A Study of Security Isolation Techniques. Comp. Surv.,
49(3):50:1–50:37.
Smalley, S. and Craig, R. (2013). Security Enhanced (SE)
Android: Bringing Flexible MAC to Android. In NDSS
’13.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
354