Nothing Special   »   [go: up one dir, main page]

You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST IR 8539 (Initial Public Draft)

Security Property Verification by Transition Model

Date Published: October 8, 2024
Comments Due: November 25, 2024 (public comment period is CLOSED)
Email Questions to: ir8539-comments@nist.gov

Author(s)

Vincent Hu (NIST)

Announcement

Verifying the security properties of access control policies is a complex and critical task. The policies and their implementation often do not explicitly express their underlying semantics, which may be implicitly embedded in the logic flows of policy rules, especially when policies are combined. Instead of evaluating and analyzing access control policies solely at the mechanism level, formal transition models are used to describe these policies and prove the system’s security properties. This approach ensures that access control mechanisms can be designed to meet security requirements.

This document explains how to apply model-checking techniques to verify security properties in transition models of access control policies. It provides a brief introduction to the fundamentals of model checking and demonstrates how access control policies are converted into automata from their transition models. The document then focuses on discussing property specifications in terms of linear temporal logic (LTL) and computation tree logic (CTL) languages with comparisons between the two. Finally, the verification process and available tools are described and compared.

 

NOTE: A call for patent claims is included on page ii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy Inclusion of Patents in ITL Publications.

Abstract

Keywords

access control; access control policy; model test; policy test; policy verification
Control Families

None selected

Documentation

Publication:
https://doi.org/10.6028/NIST.IR.8539.ipd
Download URL

Supplemental Material:
None available

Document History:
10/08/24: IR 8539 (Draft)

Topics

Security and Privacy

access control, modeling, testing & validation