CN102467416B - Visit control object granularity test framework and method - Google Patents

Visit control object granularity test framework and method Download PDF

Info

Publication number
CN102467416B
CN102467416B CN201010533179.9A CN201010533179A CN102467416B CN 102467416 B CN102467416 B CN 102467416B CN 201010533179 A CN201010533179 A CN 201010533179A CN 102467416 B CN102467416 B CN 102467416B
Authority
CN
China
Prior art keywords
access control
test
control object
case
object granularity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010533179.9A
Other languages
Chinese (zh)
Other versions
CN102467416A (en
Inventor
连一峰
张海霞
鲍旭华
李金戈
陈平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGKE INFORMATION SECURITY COMMON TECHNOLOGY NATIONAL ENGINEERING RESEARCH CENTER Co Ltd
Original Assignee
ZHONGKE INFORMATION SECURITY COMMON TECHNOLOGY NATIONAL ENGINEERING RESEARCH CENTER Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGKE INFORMATION SECURITY COMMON TECHNOLOGY NATIONAL ENGINEERING RESEARCH CENTER Co Ltd filed Critical ZHONGKE INFORMATION SECURITY COMMON TECHNOLOGY NATIONAL ENGINEERING RESEARCH CENTER Co Ltd
Priority to CN201010533179.9A priority Critical patent/CN102467416B/en
Publication of CN102467416A publication Critical patent/CN102467416A/en
Application granted granted Critical
Publication of CN102467416B publication Critical patent/CN102467416B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention aims at providing an object granularity test framework and a method for testing which stage the visit control object granularity concretely realizes to, so the visual data reference is provided for detecting whether the safe function conforms to the stage protection requirement or not. The visit control object granularity test framework and the method have the technical contents that the visit control object granularity test framework and the test method comprise three parts: visit control object granularity test index setting, visit control object information obtaining and visit control object granularity test, and whether the visit control object granularity reaches the file stage, the database stage, the database table stage, the field stage and the like through aiming at the obtaining and the analysis of the visit control object granularity information, so whether the visit control object granularity conforms to the stage protection relative standard or requirements or not is tested through the function test. By aiming at the visit control object granularity test framework and the test method, the test method is organized in a flow process type use case and arithmetic type use case form, and the actual test use case is organized and dispatched in a pluggable way.

Description

A kind of visit control object granularity test framework and method
Technical field
The invention belongs to field of information security technology, relate in particular to a kind of object testing graininess framework and method for access control.
Background technology
For the object granularity in access control, GB (GB17859-1999) regulation, for access control, should be in security strategy range of control, the object that user is created oneself has various accessing operation authorities, and can partly or entirely authorize other users by these authorities, founder user can authorize other user by this mandate ability simultaneously.Requiring object granularity for first and second level security control test and appraisal is file-level and database table level, and it is file-level, database table level, record level and (or) field level that third and fourth level security control test and appraisal require object granularity.Access control is as the important content in information system security class protection test and appraisal, and whether object granularity meets standard, is the important evidence whether access control reaches hierarchical protection requirement.
At present, only have general method step to instruct for the detection of object granularity in security platform, have no the report of clear and definite technological means.
Summary of the invention
The object of this invention is to provide a kind of framework and method of test of object granularity, why rank of the object granularity specific implementation of test access control, thus the requirement that whether meets hierarchical protection for detecting security function provides data reference intuitively.
Technology contents of the present invention is a kind of framework and method of testing of object granularity; be divided into visit control object granularity test target setting, access control object acquisition of information and visit control object granularity test three parts; by obtaining and analyzing for access control problem granular information; whether whether the object granularity of test access control reaches file-level, database level, database table level, field level etc., thereby conform to relevant criterion or the requirement of hierarchical protection by this functional test test access control object granularity.For test frame and the method for testing of access control object granularity, method of testing is with the form tissue of Diversification Type use-case and algorithmic form use-case, and the tissue of actual test case and scheduling adopt pluggable mode to carry out.
Visit control object granularity test framework as shown in Figure 1.Framework is divided into three levels: interface alternation layer, test logic call layer and bottom data layer.The superiors of framework are the function interface of test process and user interactions, can carry out the function setting of test process by this interface one side user, the result of visit control object granularity test can return to user by interface on the other hand, and the result of object testing graininess is stored in database in the mode of data message simultaneously.The second layer is that test logic calls layer, this layer can be divided into again the discriminating of test target information, the generation of visit control object granularity test logic and object acquisition of information according to the difference of test process invocation component and plug-in unit and use-case is realized three parts, completes respectively the discriminating of test target type, the extraction of testing sub-use-case and the extraction of testing algorithm use-case and combination, object acquisition of information and test logic and realize.Use this framework to conduct interviews to control the overall procedure of object testing graininess as shown in Figure 2.
Under the support of framework as shown in Figure 2, consider that under tested goal systems type and the concrete multifarious prerequisite of model, the visit control object granularity test index system of employing as shown in Figure 3.At present index system emphasis, for two types of operating system and Database Systems, relates to and forces access control and autonomous two kinds of access control realization mechanisms of access control.Whether the object granularity of access control that can Test Operating System is driver-level, file level, file and file mixed class, file/process/device level, file attribute/Element-Level; Whether object granularity that can test database access control is the field level of database level, database table level and database.This index system is organized with the XML form of layering, and therefore, as long as the index system of definition meets the requirement of XML format specification, this index system can be expanded.
In actual test process, target testing system has realized pressure access control, autonomous access control or Hybrid access control model and has differentiated that by test target in framework as shown in Figure 2 plug-in unit identifies, and comes thus different implementation models to distinguish.Discriminating plug-in unit can be identified conventional access control model at present, as BLP model, Biba model and the access control model based on role etc.
Accompanying drawing explanation
Fig. 1 is visit control object granularity test framework
Fig. 2 is visit control object granularity test overview flow chart
Fig. 3 is the access control object size indicator collection for operating system/database
Fig. 4 is that visit control object granularity test flow process is given an example
Embodiment
The method of testing of access control object granularity, whether the object granularity that comprises test access control is driver-level, file level, file and file mixed class, file-level, document element/attribute level, and whether the access control object granularity of test database system is database level, database table level, Database field level.For the test of object granularity, should first guarantee that the corresponding instrument realization of test frame or framework moves under enough access control rights, can obtain enough access control informations, to access control object granularity is analyzed fully.This framework and method do not comprise the actual test that realizes effect of access control.
Being the flow example of a visit control object granularity test as shown in Figure 4, is the testing process as an example of the file series access control testing graininess of operating system example, and it is concrete implements to comprise following three partial contents:
The first, flow testing use-case and the combination of test of heuristics use-case.For guaranteeing the realization of this framework, in the implementation procedure of actual frame, the interface of the first level is used interface framework to load the form of use-case dynamic interface, select the Diversification Type test case forming to present logic with interface according to different indexs, algorithmic form test case is understood by the input and output of algorithm the test case with certain data layout write-back Diversification Type in practical implementation, and finally completes presenting of test result by use-case invocation component.This visit control object granularity test method with use-case form tissue is for the variability of adaptive testing goal systems and the diversity of object granularity and the one tissue proposing and present framework.
As shown in Figure 4, in the time that the file series access control granularity to operating system is tested, need to experience the sub-process of four tests, its specific implementation selects use-case, access control information extraction use-case, access control object granularity to extract use-case and form by access control mechanisms test case, test index.The algorithmic form use-case that these four Diversification Type use-cases call respectively under self completes the test of corresponding mechanism, test index selection, information extraction and sreen analysis.Actual information presents and to return to Diversification Type use-case by algorithmic form use-case with certain data structure and carry out the mutual of information.The output of previous algorithmic form use-case is that the result of self Diversification Type use-case presents source, is also the input of next algorithmic form use-case.The test and the result that so complete access control object granularity present.
The second, the explanation of access control mechanisms testing algorithm use-case.In the time that being tested, the access control mechanisms of operating system file series can adopt following steps as shown in Figure 4:
Step 1, judges whether current tool/framework moves under the highest weight limit of system.Access control mechanisms is tested because relating to the security information of system level, for guaranteeing validity and the adequacy of reading information, requires instrument under highest weight limit, to move.If not highest weight limit, actual use procedure please switch under the user environment with higher level authority and move.
Step 2, according to the assigned address of OS Type search secure information storage.Because the realization mechanism of different its access control of operating system exists difference, file layout and position that security information (containing access control policy, Access Control List (ACL), rank change and adjustment information, sensitivity label information etc.) is actual are all not identical, therefore, before carrying out acquisition of information, need concrete secure memory location to confirm, be convenient to subsequent operation.In actual algorithm use-case organizational process, location determination can be placed in an algorithm use-case, also can be placed in polyalgorithm use-case.Here the embodiment adopting has used the algorithm use-case tissue compared with coarseness, has been placed in same algorithm use-case.
Step 3, searches for assigned address, judges whether to exist sensitivity label.Sensitivity label is the basis that mandatory Access Control Mechanism is realized, and is also strong one of the machine-processed key feature of visiting of judgement.Under this patent, in example, adopted this kind of method to judge, the actual use-case that carries out mechanism judgement can be multiple, selects flexibly and combines according to actual conditions.If there is no sensitivity label, access control mechanisms is autonomous access control or the mechanism without access control; If there is sensitivity label, access control mechanisms may be the access control mechanisms of mandatory Access Control Mechanism or mixed type, for example access control mechanisms based on role.
Step 3.1, in the situation that not there is not sensitivity label, judges whether to exist Access Control List (ACL).If there is no sensitivity label, access control mechanisms is autonomous access control or without access control mechanisms; If there is Access Control List (ACL), because operating system self always has user's difference, the access control mechanisms that system self realizes is autonomous access control; If there is no Access Control List (ACL), may not there is not access control mechanisms in system self.
Step 3.2, in the situation that there is sensitivity label, judges whether to exist Access Control List (ACL) again.If there is sensitivity label, access control mechanisms may be the access control mechanisms of mandatory Access Control Mechanism or mixed type.If in the judgement of this step, in system, there is the list of Access Control List (ACL) or class access control mechanisms, access control mechanisms is mixed type access control mechanisms; If in the judgement of this step, system do not exist access control list access control mechanisms be mandatory Access Control Mechanism.
Step 4, is judging that access control mechanisms is the in the situation that of forcing access control, if will determine, system has adopted the strong mechanism of visiting of which kind of type to need further to analyze the strategy of forcing access control.If read do not indicated in Mandatory Access Control/do not write down, mandatory Access Control Mechanism is BLP model; Read down/write on not if do not indicated in Mandatory Access Control, mandatory Access Control Mechanism is Biba; If there is various ways in Mandatory Access Control, may adopt different mandatory Access Control Mechanisms to carry out the protection of confidentiality, integrality and availability, need to further analyze.Can test out in system, to have adopted which kind of access control mechanisms by access control mechanisms testing algorithm as shown in Figure 4.Because the algorithm that general frame is all is still organized in the mode of use-case, so this mechanism testing algorithm can be replaced by other use-case, also can use comprehensively and test together with other use-case.Specifically calling which kind of algorithm tests and is decided by Diversification Type use-case.Simply say that Diversification Type use-case, in presenting for the data of algorithm use-case and providing support, has also played the effect of organizing algorithm use-case.
The 3rd, access control object sreen analysis algorithm.As shown in Figure 4, after the object information extraction through the processing of visit control object granularity test index, access control, call access control object sreen analysis algorithm and carry out the analysis of object granularity.Step is as follows:
Step 1, judges whether the representation of access control object is driver, and if so, access control object granularity is driver-level;
Step 2, judges whether the representation of access control object is file, and if so, access control object granularity is file level;
Step 3, judges that whether the representation of access control object is at file and file mixed mode, and if so, access control object granularity is file and file mixed class;
Step 4, judges whether the representation of access control object is file, and if so, access control object granularity is file-level;
Step 5, judges whether the representation of access control object is element or the attribute of file, and if so, access control object granularity is file attribute/content-level.
It should be noted that in this algorithm use-case, the judgement for object representation need to travel through all objects, for convenience of description, algorithm does not do further expansion.Identical with the above-mentioned access control mechanisms testing algorithm of this patent, this algorithm can be organized in the mode of integration algorithm, also can organize in the mode of mother and sons' algorithm.

Claims (5)

1. a method for visit control object granularity test, is characterized in that: described method of testing is to test with the file series access control granularity of operating system, and its concrete testing process comprises following three parts:
Part I: flow testing use-case and test of heuristics use-case are combined, select the Diversification Type test case forming to present logic with interface according to different indexs, algorithmic form test case in the process of implementation by the input and output of algorithm with certain data layout write-back Diversification Type test case, and finally complete presenting of test result by use-case invocation component;
Part II: the step adopting while utilizing access control mechanisms to test:
(1), judge whether current tool/framework moves under the highest weight limit of system; If not highest weight limit, actual use procedure please switch under the user environment with higher level authority and move;
(2), according to the assigned address of OS Type search secure information storage;
(3), assigned address is searched for, judge whether to exist sensitivity label and determine access control mechanisms;
(4), judging that access control mechanisms is, the in the situation that of forcing access control, further to analyze Mandatory Access Control to determine system adopts the pressure access mechanism of which kind of type;
Part III: call access control object sreen analysis algorithm and carry out the analysis of object granularity after through the processing of visit control object granularity test index, the information extraction of access control object, concrete steps are:
(1) whether the form of expression that judges access control object is driver, and if so, access control object granularity is driver-level;
(2) whether the representation that judges access control object is file, and if so, access control object granularity is file level;
(3) whether the representation that judges access control object is at file and file mixed mode, and if so, access control object granularity is file and file mixed class;
(4) whether the representation that judges access control object is file, and if so, access control object granularity is file-level;
(5) whether the representation that judges access control object is element or the attribute of file, and if so, access control object granularity is file attribute/content-level.
2. the method for a kind of visit control object granularity test as claimed in claim 1, it is characterized in that: when described flow testing use-case and test of heuristics use-case are combined, the sub-process that need to experience four tests, is specially successively: access control mechanisms test, test index are selected, access control information extracts and access control object granularity is extracted;
The algorithmic form use-case that described four Diversification Type use-cases call respectively under self completes the test of corresponding mechanism, test index selection, information extraction and sreen analysis; Actual information presents and to return to Diversification Type use-case by algorithmic form use-case with certain data structure and carry out the mutual of information; The output of previous algorithmic form use-case is that the result of self Diversification Type use-case presents source, is also the input of next algorithmic form use-case, and the test and the result that so complete access control object granularity present.
3. the method for a kind of visit control object granularity test as claimed in claim 1, is characterized in that: described sensitivity label is the basis that mandatory Access Control Mechanism is realized, and is one of key feature of judgement pressure access mechanism; While judgement, the actual use-case that carries out mechanism judgement can be multiple.
4. the method for a kind of visit control object granularity test as claimed in claim 1, is characterized in that: in the described step adopting while utilizing access control mechanisms to test, and the judgement for access control mechanisms:
In the situation that not there is not sensitivity label, judge whether to exist Access Control List (ACL); If there is no sensitivity label, access control mechanisms is autonomous access control or without access control mechanisms; If there is Access Control List (ACL), because operating system self always has user's difference, the access control mechanisms that system self realizes is autonomous access control; If there is no Access Control List (ACL), may not there is not access control mechanisms in system self;
In the situation that there is sensitivity label, again judge whether to exist Access Control List (ACL); If there is sensitivity label, access control mechanisms may be the access control mechanisms of mandatory Access Control Mechanism or mixed type; If in the judgement of this step, in system, there is the list of Access Control List (ACL) or class access control mechanisms, access control mechanisms is mixed type access control mechanisms; If in the judgement of this step, system do not exist access control list access control mechanisms be mandatory Access Control Mechanism.
5. the method for a kind of visit control object granularity test as claimed in claim 1, is characterized in that: described analysis forces the strategy of access control to determine that system adopts the mode of pressure access mechanism type to be:
If read do not indicated in Mandatory Access Control/do not write down, mandatory Access Control Mechanism is BLP model; Read down/write on not if do not indicated in Mandatory Access Control, mandatory Access Control Mechanism is Biba; If there is various ways in Mandatory Access Control, may adopt different mandatory Access Control Mechanisms to carry out the protection of confidentiality, integrality and availability, need to further analyze.
CN201010533179.9A 2010-11-05 2010-11-05 Visit control object granularity test framework and method Active CN102467416B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010533179.9A CN102467416B (en) 2010-11-05 2010-11-05 Visit control object granularity test framework and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010533179.9A CN102467416B (en) 2010-11-05 2010-11-05 Visit control object granularity test framework and method

Publications (2)

Publication Number Publication Date
CN102467416A CN102467416A (en) 2012-05-23
CN102467416B true CN102467416B (en) 2014-05-14

Family

ID=46071082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010533179.9A Active CN102467416B (en) 2010-11-05 2010-11-05 Visit control object granularity test framework and method

Country Status (1)

Country Link
CN (1) CN102467416B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096892B (en) * 2019-04-29 2021-07-02 武汉中锐源信息技术开发有限公司 Database attribute access control method and system
CN112463599A (en) * 2020-11-18 2021-03-09 平安消费金融有限公司 Automatic testing method and device, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885297A (en) * 2006-06-02 2006-12-27 石杰 Method for role-based access control model with precise access control strategy
CN101075254A (en) * 2007-06-08 2007-11-21 北京神舟航天软件技术有限公司 Autonomous access control method for row-level data of database table

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1885297A (en) * 2006-06-02 2006-12-27 石杰 Method for role-based access control model with precise access control strategy
CN101075254A (en) * 2007-06-08 2007-11-21 北京神舟航天软件技术有限公司 Autonomous access control method for row-level data of database table

Also Published As

Publication number Publication date
CN102467416A (en) 2012-05-23

Similar Documents

Publication Publication Date Title
Greer et al. Cyber-physical systems and internet of things
KR102139029B1 (en) Generalized graph, rule, and spatial structure based recommendation engine
Pineda et al. The performance of range maps and species distribution models representing the geographic variation of species richness at different resolutions
Blasch Level 5 (user refinement) issues supporting information fusion management
US20110153748A1 (en) Remote forensics system based on network
Harding Data quality in the integration and analysis of data from multiple sources: some research challenges
US20170337098A1 (en) Cloud device, terminal device, and method for handling abnormalities therein
Landier et al. Spatiotemporal analysis of malaria for new sustainable control strategies
CN103460185A (en) Device for analyzing and classifying a mobile terminal application for a docking station of a motor vehicle
EP2649512A2 (en) Place-based image organization
US20130079936A1 (en) Remote access for water infrastructure management
KR101331452B1 (en) Method for providing database management and the database management server there of
CN108016402A (en) Authority distributing method, storage medium, electronic equipment and the automobile of automobile
CN102467416B (en) Visit control object granularity test framework and method
CN101159047A (en) Information processing system, information processing method and computer readable medium
JP2021507436A5 (en)
US10789577B2 (en) Workflow, assessment, verification, and evaluation (WAVE) system and method
CN114816377A (en) Script obtaining method and device
Riazy et al. Systematic literature review of fairness in learning analytics and application of insights in a case study
Spagnuelo et al. Transparency enhancing tools and the GDPR: Do they match?
CN116342342A (en) Student behavior detection method, electronic device and readable storage medium
KR101415528B1 (en) Apparatus and Method for processing data error for distributed system
JP2022180289A (en) Quality information output apparatus, quality information output method, and program
CN111523830A (en) Method, device, equipment and medium for guiding market supervision based on multi-dimensional data
Netek et al. WebGIS 2.0 as approach for flexible web-based map application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 100080 Beijing City, Haidian District Zhongguancun street, No. 19 gate tower B 16 floor North Wing

Applicant after: Zhongke Information Security Common Technology National Engineering Research Center Co., Ltd.

Address before: 100080 Beijing City, Haidian District Zhongguancun street, No. 19 gate tower B 16 floor North Wing

Applicant before: Zhongke Zhengyang Information Security Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: ZHONGKE ZHENGYANG INFORMATION SECURITY TECHNOLOGY CO., LTD. TO: NERCIS

C14 Grant of patent or utility model
GR01 Patent grant