Title
Access control policy evolution: an empirical study
Abstract
Access Control Policies (ACPs) evolve. Understanding the trends and evolution patterns of ACPs could provide guidance about the reliability and maintenance of ACPs. Our research goal is to help policy authors improve the quality of ACP evolution based on the understanding of trends and evolution patterns in ACPs We performed an empirical study by analyzing the ACP changes over time for two systems: Security Enhanced Linux (SELinux), and an open-source virtual computing platform (VCL). We measured trends in terms of the number of policy lines and lines of code (LOC), respectively. We observed evolution patterns. For example, an evolution pattern st1 → st2 says that st1 (e.g., \"read\") evolves into st2 (e.g., \"read\" and \"write\"). This pattern indicates that policy authors add \"write\" permission in addition to existing \"read\" permission. We found that some of evolution patterns appear to occur more frequently.
Year
DOI
Venue
2014
10.1145/2600176.2600204
ISSRE
Keywords
DocType
ISSN
network intrusion detection,security,data analysis,acp evolution,virtual computing laboratory cloud,access control policy evolution,acp historical change data analysis,access controls,vcl cloud,access control policy,security enhanced linux operating system,snort,authorisation,evolution, maintainability, access control policy,maintainability,linux,evolution,cloud computing,selinux operating system
Conference
1071-9458
Citations 
PageRank 
References 
0
0.34
1
Authors
4
Name
Order
Citations
PageRank
JeeHyun Hwang100.34
Da Young Lee2111.76
Laurie Williams34033473.64
Mladen A. Vouk445249.92