首页 > 最新文献

Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies最新文献

英文 中文
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques 用优化模理论技术求解多目标工作流可满足性问题
Clara Bertolissi, D. R. D. Santos, Silvio Ranise
Security-sensitive workflows impose constraints on the control-flow and authorization policies that may lead to unsatisfiable instances. In these cases, it is still possible to find "least bad" executions where costs associated to authorization violations are minimized, solving the so-called Multi-Objective Workflow Satisfiability Problem (MO-WSP). The MO-WSP is inspired by the Valued WSP and its generalization, the Bi-Objective WSP, but our work considers quantitative solutions to the WSP without abstracting control-flow constraints. In this paper, we define variations of the MO-WSP and solve them using bounded model checking and optimization modulo theories solving. We validate our solutions on real-world workflows and show their scalability on synthetic instances.
对安全敏感的工作流对控制流和授权策略施加了约束,这可能导致不满意的实例。在这些情况下,仍然有可能找到“最不坏”的执行,其中与授权违规相关的成本最小化,从而解决所谓的多目标工作流可满意度问题(MO-WSP)。MO-WSP的灵感来自于有值WSP及其推广的双目标WSP,但我们的工作考虑了WSP的定量解决方案,而没有抽象控制流约束。在本文中,我们定义了MO-WSP的变化,并利用有界模型检验和优化模理论求解它们。我们在真实的工作流上验证我们的解决方案,并在合成实例上展示它们的可伸缩性。
{"title":"Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques","authors":"Clara Bertolissi, D. R. D. Santos, Silvio Ranise","doi":"10.1145/3205977.3205982","DOIUrl":"https://doi.org/10.1145/3205977.3205982","url":null,"abstract":"Security-sensitive workflows impose constraints on the control-flow and authorization policies that may lead to unsatisfiable instances. In these cases, it is still possible to find \"least bad\" executions where costs associated to authorization violations are minimized, solving the so-called Multi-Objective Workflow Satisfiability Problem (MO-WSP). The MO-WSP is inspired by the Valued WSP and its generalization, the Bi-Objective WSP, but our work considers quantitative solutions to the WSP without abstracting control-flow constraints. In this paper, we define variations of the MO-WSP and solve them using bounded model checking and optimization modulo theories solving. We validate our solutions on real-world workflows and show their scalability on synthetic instances.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117113631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reactive Access Control Systems 无功访问控制系统
Maryam Davari, E. Bertino
In context-aware applications, user's access privileges rely on both user's identity and context. Access control rules are usually statically defined while contexts and the system state can change dynamically. Changes in contexts can result in service disruptions. To address this issue, this poster proposes a reactive access control system that associates contingency plans with access control rules. Risk scores are also associated with actions part of the contingency plans. Such risks are estimated by using fuzzy inference. Our approach is cast into the XACML reference architecture.
在上下文感知的应用程序中,用户的访问权限依赖于用户的身份和上下文。访问控制规则通常是静态定义的,而上下文和系统状态可以动态更改。上下文中的更改可能导致服务中断。为了解决这个问题,本海报提出了一个反应性访问控制系统,该系统将应急计划与访问控制规则相关联。风险评分也与应急计划的行动部分相关联。利用模糊推理对这些风险进行了估计。我们的方法被转换为XACML参考体系结构。
{"title":"Reactive Access Control Systems","authors":"Maryam Davari, E. Bertino","doi":"10.1145/3205977.3208947","DOIUrl":"https://doi.org/10.1145/3205977.3208947","url":null,"abstract":"In context-aware applications, user's access privileges rely on both user's identity and context. Access control rules are usually statically defined while contexts and the system state can change dynamically. Changes in contexts can result in service disruptions. To address this issue, this poster proposes a reactive access control system that associates contingency plans with access control rules. Risk scores are also associated with actions part of the contingency plans. Such risks are estimated by using fuzzy inference. Our approach is cast into the XACML reference architecture.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131896709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms 感知还是观察?通过收集和执行机制平衡传感系统中的效用和隐私
Adam J. Lee, Jacob T. Biehl, C. Curry
Devices with embedded sensors are permeating the computing landscape, allowing the collection and analysis of rich data about individuals, smart spaces, and their interactions. This class of devices enables a useful array of home automation and connected workplace functionality to individuals within instrumented spaces. Unfortunately, the increasing pervasiveness of sensors can lead to perceptions of privacy loss by their occupants. Given that many instrumented spaces exist as platforms outside of a user's control---e.g., IoT sensors in the home that rely on cloud infrastructure or connected workplaces managed by one's employer---enforcing access controls via a trusted reference monitor may do little to assuage individuals' privacy concerns. This calls for novel enforcement mechanisms for controlling access to sensed data. In this paper, we investigate the interplay between sensor fidelity and individual comfort, with the goal of understanding the design space for effective, yet palatable, sensors for the workplace. In the context of a common space contextualization task, we survey and interview individuals about their comfort with three common sensing modalities: video, audio, and passive infrared. This allows us to explore the extent to which discomfort with sensor platforms is a function of detected states or sensed data. Our findings uncover interesting interplays between content, context, fidelity, history, and privacy. This, in turn, leads to design recommendations regarding how to increase comfort with sensing technologies by revisiting the mechanisms by which user preferences and policies are enforced in situations where the infrastructure itself is not trusted.
带有嵌入式传感器的设备正在渗透到计算领域,允许收集和分析关于个人、智能空间及其交互的丰富数据。这类设备为仪表空间中的个人提供了一系列有用的家庭自动化和连接的工作场所功能。不幸的是,传感器的日益普及可能导致他们的居住者的隐私损失的感知。考虑到许多仪器化空间作为用户控制之外的平台存在——例如:例如,家中的物联网传感器依赖于云基础设施,或者由雇主管理的联网工作场所——通过可信的参考监视器强制执行访问控制,可能无助于缓解个人对隐私的担忧。这就需要新的执行机制来控制对感测数据的访问。在本文中,我们研究了传感器保真度和个人舒适度之间的相互作用,目的是了解工作场所有效而可口的传感器的设计空间。在公共空间情境化任务的背景下,我们通过三种常见的感知方式(视频、音频和被动红外)调查和采访了个人的舒适度。这使我们能够探索传感器平台的不适在多大程度上是检测状态或感测数据的函数。我们的发现揭示了内容、背景、保真度、历史和隐私之间有趣的相互作用。这反过来又导致了关于如何通过重新审视在基础设施本身不受信任的情况下执行用户偏好和策略的机制来提高感知技术舒适度的设计建议。
{"title":"Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms","authors":"Adam J. Lee, Jacob T. Biehl, C. Curry","doi":"10.1145/3205977.3205983","DOIUrl":"https://doi.org/10.1145/3205977.3205983","url":null,"abstract":"Devices with embedded sensors are permeating the computing landscape, allowing the collection and analysis of rich data about individuals, smart spaces, and their interactions. This class of devices enables a useful array of home automation and connected workplace functionality to individuals within instrumented spaces. Unfortunately, the increasing pervasiveness of sensors can lead to perceptions of privacy loss by their occupants. Given that many instrumented spaces exist as platforms outside of a user's control---e.g., IoT sensors in the home that rely on cloud infrastructure or connected workplaces managed by one's employer---enforcing access controls via a trusted reference monitor may do little to assuage individuals' privacy concerns. This calls for novel enforcement mechanisms for controlling access to sensed data. In this paper, we investigate the interplay between sensor fidelity and individual comfort, with the goal of understanding the design space for effective, yet palatable, sensors for the workplace. In the context of a common space contextualization task, we survey and interview individuals about their comfort with three common sensing modalities: video, audio, and passive infrared. This allows us to explore the extent to which discomfort with sensor platforms is a function of detected states or sensed data. Our findings uncover interesting interplays between content, context, fidelity, history, and privacy. This, in turn, leads to design recommendations regarding how to increase comfort with sensing technologies by revisiting the mechanisms by which user preferences and policies are enforced in situations where the infrastructure itself is not trusted.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116004026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security 不充分的规范、错误的实现和缺乏平台支持如何阻碍安全性
Omar Chowdhury
Developing a secure system (or, protocol) in general boils down to having a correct and robust specification which developers faithfully implement with the available platform support. Vulnerabilities can thus crop up due to inadequate specification, buggy implementations, or the lack of appropriate security constructs in the platform. In this talk, I will present examples of insecurity due to inadequate specification, wrong implementations, and deficient platform support. I will particularly focus on how automated reasoning and formal verification techniques can greatly contribute towards detecting vulnerabilities. In the first example, I will show how 4G LTE telecommunication protocol specification lacks security considerations which can be exploited by adversaries to have catastrophic impacts. Next, I will present how incorrect X.509 certificate validation implementations in open-source SSL/TLS libraries leave users prone to impersonation attacks. Finally, I will conclude my talk with a discussion of how lack of hardware support makes enforcing Digital Rights Management (DRM) policies infeasible for mobile devices.
开发一个安全的系统(或协议)通常归结为拥有一个正确和健壮的规范,开发人员用可用的平台支持忠实地实现它。因此,由于规范不充分、实现有缺陷或平台中缺乏适当的安全构造,漏洞可能会突然出现。在这次演讲中,我将介绍一些不安全的例子,这些不安全是由不充分的规范、错误的实现和缺乏平台支持引起的。我将特别关注自动推理和形式化验证技术如何为检测漏洞做出巨大贡献。在第一个示例中,我将展示4G LTE电信协议规范如何缺乏安全考虑,这可能被对手利用来产生灾难性影响。接下来,我将介绍开源SSL/TLS库中不正确的X.509证书验证实现如何使用户容易受到冒充攻击。最后,我将以硬件支持的缺乏如何导致数字版权管理(DRM)政策在移动设备上无法实施来结束我的演讲。
{"title":"How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security","authors":"Omar Chowdhury","doi":"10.1145/3205977.3206002","DOIUrl":"https://doi.org/10.1145/3205977.3206002","url":null,"abstract":"Developing a secure system (or, protocol) in general boils down to having a correct and robust specification which developers faithfully implement with the available platform support. Vulnerabilities can thus crop up due to inadequate specification, buggy implementations, or the lack of appropriate security constructs in the platform. In this talk, I will present examples of insecurity due to inadequate specification, wrong implementations, and deficient platform support. I will particularly focus on how automated reasoning and formal verification techniques can greatly contribute towards detecting vulnerabilities. In the first example, I will show how 4G LTE telecommunication protocol specification lacks security considerations which can be exploited by adversaries to have catastrophic impacts. Next, I will present how incorrect X.509 certificate validation implementations in open-source SSL/TLS libraries leave users prone to impersonation attacks. Finally, I will conclude my talk with a discussion of how lack of hardware support makes enforcing Digital Rights Management (DRM) policies infeasible for mobile devices.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128916331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control 在访问控制中实现更强的表达性、灵活性和一致性
Jiaming Jiang, Rada Y. Chirkova, J. Doyle, A. Rosenthal
Attribute-based access control (ABAC) is a general access control model that subsumes numerous earlier access control models. Its increasing popularity stems from the intuitive generic structure of granting permissions based on application and domain attributes of users, subjects, objects, and other entities in the system. Multiple formal and informal languages have been developed to express policies in terms of such attributes. The utility of ABAC policy languages is potentially undermined without a properly formalized underlying model. The high-level structure in a majority of ABAC models consists of sets of tokens and sets of sets, expressions that demand that the reader unpack multiple levels of sets and tokens to determine what things mean. The resulting reduced readability potentially endangers correct expression, reduces maintainability, and impedes validation. These problems could be magnified in models that employ nonuniform representations of actions and their governing policies. We propose to avoid these magnified problems by recasting the high-level structure of ABAC models in a logical formalism that treats all actions (by users and others) uniformly and that keeps existing policy languages in place by interpreting their attributes in terms of the restructured model. In comparison to existing ABAC models, use of a logical language for model formalization, including hierarchies of types of entities and attributes, promises improved expressiveness in specifying the relationships between and requirements on application and domain attributes. A logical modeling language also potentially improves flexibility in representing relationships as attributes to support some widely used policy languages. Consistency and intelligibility are improved by using uniform means for representing different types of controlled actions---such as regular access control actions, administrative actions, and user logins---and their governing policies. Logical languages also provide a well-defined denotational semantics supported by numerous formal inference and verification tools.
基于属性的访问控制(ABAC)是一种综合了许多早期访问控制模型的通用访问控制模型。它的日益流行源于基于用户、主题、对象和系统中其他实体的应用程序和领域属性授予权限的直观通用结构。已经开发了多种正式和非正式语言来根据这些属性表达策略。如果没有适当形式化的底层模型,ABAC策略语言的效用可能会被破坏。大多数ABAC模型中的高级结构由标记集和集合集组成,这些表达式要求读者解压缩多个级别的集合和标记以确定事物的含义。由此导致的可读性降低可能会危及正确的表达式,降低可维护性,并阻碍验证。这些问题在使用行动及其管理策略的不统一表示的模型中可能会被放大。为了避免这些放大的问题,我们建议将ABAC模型的高层结构重新塑造为一种逻辑形式,统一对待(用户和其他人)的所有操作,并通过根据重构模型解释现有策略语言的属性来保持现有策略语言。与现有的ABAC模型相比,使用逻辑语言进行模型形式化,包括实体和属性类型的层次结构,可以在指定应用程序和领域属性之间的关系和需求时改善表达性。逻辑建模语言还可能提高将关系表示为属性的灵活性,从而支持一些广泛使用的策略语言。通过使用统一的方法来表示不同类型的受控操作(例如常规访问控制操作、管理操作和用户登录)及其治理策略,可以提高一致性和可理解性。逻辑语言还提供由许多形式推理和验证工具支持的定义良好的指称语义。
{"title":"Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control","authors":"Jiaming Jiang, Rada Y. Chirkova, J. Doyle, A. Rosenthal","doi":"10.1145/3205977.3208950","DOIUrl":"https://doi.org/10.1145/3205977.3208950","url":null,"abstract":"Attribute-based access control (ABAC) is a general access control model that subsumes numerous earlier access control models. Its increasing popularity stems from the intuitive generic structure of granting permissions based on application and domain attributes of users, subjects, objects, and other entities in the system. Multiple formal and informal languages have been developed to express policies in terms of such attributes. The utility of ABAC policy languages is potentially undermined without a properly formalized underlying model. The high-level structure in a majority of ABAC models consists of sets of tokens and sets of sets, expressions that demand that the reader unpack multiple levels of sets and tokens to determine what things mean. The resulting reduced readability potentially endangers correct expression, reduces maintainability, and impedes validation. These problems could be magnified in models that employ nonuniform representations of actions and their governing policies. We propose to avoid these magnified problems by recasting the high-level structure of ABAC models in a logical formalism that treats all actions (by users and others) uniformly and that keeps existing policy languages in place by interpreting their attributes in terms of the restructured model. In comparison to existing ABAC models, use of a logical language for model formalization, including hierarchies of types of entities and attributes, promises improved expressiveness in specifying the relationships between and requirements on application and domain attributes. A logical modeling language also potentially improves flexibility in representing relationships as attributes to support some widely used policy languages. Consistency and intelligibility are improved by using uniform means for representing different types of controlled actions---such as regular access control actions, administrative actions, and user logins---and their governing policies. Logical languages also provide a well-defined denotational semantics supported by numerous formal inference and verification tools.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models 健康信息系统中使用主题模型的隐私感知风险自适应访问控制
Wenxi Zhang, Hao Li, Min Zhang, Zhiquan Lv
Traditional role-based access control fails to meet the privacy requirements for patient data in medical systems, as it is infeasible for policy makers to foresee what information doctors may need for diagnosis and treatment in various situations. The universal practice in hospitals is to grant doctors unlimited access, which in turn increases the risk of breaching patient privacy. In this paper, we propose a dynamic risk-adaptive access control model for health IT systems by taking into consideration the relationships between data and access behaviors. By training topic models to portray individual and group-level access behaviors, we quantify the risk for each user over a certain period of time. Malicious users are supposed to get higher risk scores than honest users due to improper requests. Thus their further access would be denied under our access control scheme. The topic model and risk scores are periodically updated to advance the self-adaptability of the system. Experimental results have shown that our solution could effectively distinguish malicious doctors even if they deliberately conceal the misconducts.
传统的基于角色的访问控制无法满足医疗系统中对患者数据的隐私要求,因为决策者无法预见医生在各种情况下的诊断和治疗可能需要哪些信息。医院的普遍做法是给予医生无限制的访问权限,这反过来又增加了侵犯患者隐私的风险。在本文中,我们提出了一种考虑数据和访问行为之间关系的健康IT系统动态风险自适应访问控制模型。通过训练主题模型来描绘个人和群体级别的访问行为,我们量化了每个用户在特定时间段内的风险。恶意用户由于不正当的请求,应该比诚实用户获得更高的风险评分。因此,在我们的访问控制方案下,他们的进一步访问将被拒绝。定期更新主题模型和风险评分,提高系统的自适应性。实验结果表明,我们的解决方案可以有效地识别恶意医生,即使他们故意隐瞒不当行为。
{"title":"Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models","authors":"Wenxi Zhang, Hao Li, Min Zhang, Zhiquan Lv","doi":"10.1145/3205977.3205991","DOIUrl":"https://doi.org/10.1145/3205977.3205991","url":null,"abstract":"Traditional role-based access control fails to meet the privacy requirements for patient data in medical systems, as it is infeasible for policy makers to foresee what information doctors may need for diagnosis and treatment in various situations. The universal practice in hospitals is to grant doctors unlimited access, which in turn increases the risk of breaching patient privacy. In this paper, we propose a dynamic risk-adaptive access control model for health IT systems by taking into consideration the relationships between data and access behaviors. By training topic models to portray individual and group-level access behaviors, we quantify the risk for each user over a certain period of time. Malicious users are supposed to get higher risk scores than honest users due to improper requests. Thus their further access would be denied under our access control scheme. The topic model and risk scores are periodically updated to advance the self-adaptability of the system. Experimental results have shown that our solution could effectively distinguish malicious doctors even if they deliberately conceal the misconducts.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116389937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Access Control in the Era of Big Data: State of the Art and Research Directions 大数据时代的访问控制:现状与研究方向
Pietro Colombo, E. Ferrari
Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a standard data model and related data manipulation language. In this paper, we focus on one of the key data security services, that is, access control, by highlighting the differences with traditional data management systems and describing a set of requirements that any access control solution for Big Data platforms may fulfill. We then describe the state of the art and discuss open research issues.
由于大数据的数量、种类和速度,以及迄今为止缺乏标准的数据模型和相关的数据操作语言,数据安全和隐私问题被放大。在本文中,我们将重点关注一个关键的数据安全服务,即访问控制,通过强调与传统数据管理系统的区别,并描述一组大数据平台访问控制解决方案可能满足的要求。然后,我们描述的艺术状态和讨论开放的研究问题。
{"title":"Access Control in the Era of Big Data: State of the Art and Research Directions","authors":"Pietro Colombo, E. Ferrari","doi":"10.1145/3205977.3205998","DOIUrl":"https://doi.org/10.1145/3205977.3205998","url":null,"abstract":"Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a standard data model and related data manipulation language. In this paper, we focus on one of the key data security services, that is, access control, by highlighting the differences with traditional data management systems and describing a set of requirements that any access control solution for Big Data platforms may fulfill. We then describe the state of the art and discuss open research issues.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126357909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Automated Coverage-Based Testing of XACML Policies XACML策略的基于覆盖率的自动化测试
Dianxiang Xu, Roshan Shrestha, Ning Shen
While the standard language XACML is very expressive for specifying fine-grained access control policies, defects can get into XACML policies for various reasons, such as misunderstanding of access control requirements, omissions, and coding errors. These defects may result in unauthorized accesses, escalation of privileges, and denial of service. Therefore, quality assurance of XACML policies for real-world information systems has become an important issue. To address this issue, this paper presents a family of coverage criteria for XACML policies, such as rule coverage, rule pair coverage, decision coverage, and Modified Condition/Decision Coverage (MC/DC). To demonstrate the assurance levels of these coverage criteria, we have developed methods for automatically generating tests, i.e., access requests, to satisfy the coverage criteria using a constraint solver. We have evaluated these methods through mutation analysis of various policies with different levels of complexity. The experiment results have shown that the rule coverage is far from adequate for revealing the majority of defects in XACML policies, and that both MC/DC and decision coverage tests have outperformed the existing methods for testing XACML policies. In particular, MC/DC tests achieve a very high level of quality assurance of XACML policies.
虽然标准语言XACML在指定细粒度访问控制策略方面非常有表现力,但是由于各种原因,XACML策略可能会出现缺陷,例如对访问控制需求的误解、遗漏和编码错误。这些缺陷可能导致未经授权的访问、特权升级和拒绝服务。因此,实际信息系统的XACML策略的质量保证已成为一个重要问题。为了解决这个问题,本文提出了XACML策略的一系列覆盖标准,例如规则覆盖、规则对覆盖、决策覆盖和修改条件/决策覆盖(MC/DC)。为了演示这些覆盖标准的保证级别,我们开发了自动生成测试的方法,例如,访问请求,使用约束求解器来满足覆盖标准。我们通过对不同复杂程度的各种政策的突变分析来评估这些方法。实验结果表明,规则覆盖率远远不足以揭示XACML策略中的大多数缺陷,MC/DC和决策覆盖率测试都优于现有的测试XACML策略的方法。特别是,MC/DC测试实现了非常高水平的XACML策略质量保证。
{"title":"Automated Coverage-Based Testing of XACML Policies","authors":"Dianxiang Xu, Roshan Shrestha, Ning Shen","doi":"10.1145/3205977.3205979","DOIUrl":"https://doi.org/10.1145/3205977.3205979","url":null,"abstract":"While the standard language XACML is very expressive for specifying fine-grained access control policies, defects can get into XACML policies for various reasons, such as misunderstanding of access control requirements, omissions, and coding errors. These defects may result in unauthorized accesses, escalation of privileges, and denial of service. Therefore, quality assurance of XACML policies for real-world information systems has become an important issue. To address this issue, this paper presents a family of coverage criteria for XACML policies, such as rule coverage, rule pair coverage, decision coverage, and Modified Condition/Decision Coverage (MC/DC). To demonstrate the assurance levels of these coverage criteria, we have developed methods for automatically generating tests, i.e., access requests, to satisfy the coverage criteria using a constraint solver. We have evaluated these methods through mutation analysis of various policies with different levels of complexity. The experiment results have shown that the rule coverage is far from adequate for revealing the majority of defects in XACML policies, and that both MC/DC and decision coverage tests have outperformed the existing methods for testing XACML policies. In particular, MC/DC tests achieve a very high level of quality assurance of XACML policies.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Data Breach and Multiple Points to Stop It 数据泄露和多点阻止它
D. Yao
Preventing unauthorized access to sensitive data is an exceedingly complex access control problem. In this keynote, I will break down the data breach problem and give insights into how organizations could and should do to reduce their risks. The talk will start with discussing the technical reasons behind some of the recent high-profile data breach incidents (e.g., in Equifax, Target), as well as pointing out the threats of inadvertent or accidental data leaks. Then, I will show that there are usually multiple points to stop data breach and give an overview of the relevant state-of-the-art solutions. I will focus on some of the recent algorithmic advances in preventing inadvertent data loss, including set-based and alignment-based screening techniques, outsourced screening, and GPU-based performance acceleration. I will also briefly discuss the role of non-technical factors (e.g., organizational culture on security) in data protection. Because of the cat-and-mouse-game nature of cybersecurity, achieving absolute data security is impossible. However, proactively securing critical data paths through strategic planning and placement of security tools will help reduce the risks. I will also point out a few exciting future research directions, e.g., on data leak detection as a cloud security service and deep learning for reducing false alarms in continuous authentication and the prickly insider-threat detection.
防止对敏感数据的非授权访问是一个极其复杂的访问控制问题。在这个主题演讲中,我将分解数据泄露问题,并就组织可以和应该如何降低风险给出见解。讲座将首先讨论最近一些引人注目的数据泄露事件背后的技术原因(例如,在Equifax, Target),以及指出无意或意外数据泄露的威胁。然后,我将展示通常有多个点来阻止数据泄露,并概述相关的最新解决方案。我将重点介绍在防止意外数据丢失方面的一些最新算法进展,包括基于集合和基于对齐的筛选技术、外包筛选和基于gpu的性能加速。我还将简要讨论非技术因素(例如,关于安全的组织文化)在数据保护中的作用。由于网络安全的猫鼠游戏性质,实现绝对的数据安全是不可能的。然而,通过战略规划和部署安全工具来主动保护关键数据路径将有助于降低风险。我还将指出一些令人兴奋的未来研究方向,例如,作为云安全服务的数据泄漏检测,以及用于减少连续身份验证中的误报的深度学习,以及棘手的内部威胁检测。
{"title":"Data Breach and Multiple Points to Stop It","authors":"D. Yao","doi":"10.1145/3205977.3206001","DOIUrl":"https://doi.org/10.1145/3205977.3206001","url":null,"abstract":"Preventing unauthorized access to sensitive data is an exceedingly complex access control problem. In this keynote, I will break down the data breach problem and give insights into how organizations could and should do to reduce their risks. The talk will start with discussing the technical reasons behind some of the recent high-profile data breach incidents (e.g., in Equifax, Target), as well as pointing out the threats of inadvertent or accidental data leaks. Then, I will show that there are usually multiple points to stop data breach and give an overview of the relevant state-of-the-art solutions. I will focus on some of the recent algorithmic advances in preventing inadvertent data loss, including set-based and alignment-based screening techniques, outsourced screening, and GPU-based performance acceleration. I will also briefly discuss the role of non-technical factors (e.g., organizational culture on security) in data protection. Because of the cat-and-mouse-game nature of cybersecurity, achieving absolute data security is impossible. However, proactively securing critical data paths through strategic planning and placement of security tools will help reduce the risks. I will also point out a few exciting future research directions, e.g., on data leak detection as a cloud security service and deep learning for reducing false alarms in continuous authentication and the prickly insider-threat detection.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access Control Enforcement within MQTT-based Internet of Things Ecosystems 基于mqtt的物联网生态系统中的访问控制实施
Pietro Colombo, E. Ferrari
Confidentiality and privacy of data managed by IoT ecosystems is becoming a primary concern. This paper targets the design of a general access control enforcement mechanism for MQTT-based IoT ecosystems. The proposed approach is presented with ABAC, but other access control models can be similarly supported. The solution is based on an enforcement monitor that has been designed to operate as a proxy between MQTT clients and an MQTT server. The monitor enforces access control constraints by intercepting and possibly manipulating the flow of exchanged MQTT control packets. Early experimental evaluations have overall shown low enforcement overhead.
物联网生态系统管理的数据的保密性和隐私性正在成为一个主要问题。本文旨在为基于mqtt的物联网生态系统设计通用的访问控制执行机制。所提出的方法是用ABAC提出的,但也可以类似地支持其他访问控制模型。该解决方案基于强制监控器,该监控器被设计为MQTT客户机和MQTT服务器之间的代理。监视器通过拦截并可能操纵交换的MQTT控制数据包流来实施访问控制约束。早期的实验评估总体上显示执行开销很低。
{"title":"Access Control Enforcement within MQTT-based Internet of Things Ecosystems","authors":"Pietro Colombo, E. Ferrari","doi":"10.1145/3205977.3205986","DOIUrl":"https://doi.org/10.1145/3205977.3205986","url":null,"abstract":"Confidentiality and privacy of data managed by IoT ecosystems is becoming a primary concern. This paper targets the design of a general access control enforcement mechanism for MQTT-based IoT ecosystems. The proposed approach is presented with ABAC, but other access control models can be similarly supported. The solution is based on an enforcement monitor that has been designed to operate as a proxy between MQTT clients and an MQTT server. The monitor enforces access control constraints by intercepting and possibly manipulating the flow of exchanged MQTT control packets. Early experimental evaluations have overall shown low enforcement overhead.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
期刊
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1