首页 > 最新文献

Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies最新文献

英文 中文
Efficient Extended ABAC Evaluation 高效扩展ABAC评估
C. Morisset, T. Willemse, Nicola Zannone
A main challenge of attribute-based access control (ABAC) is the handling of missing information. Several studies show that the way standard ABAC mechanisms (e.g., XACML) handle missing information is flawed, making ABAC policies vulnerable to attribute-hiding attacks. Recent work addressed the problem of missing information in ABAC by introducing the notion of extended evaluation, where the evaluation of a query considers all possible ways of extending that query. This method counters attribute-hiding attacks, but a naive implementation is intractable, as it requires an evaluation of the whole query space. In this paper, we present an efficient extended ABAC evaluation method that relies on the encoding of ABAC policies as multiple Binary Decision Diagrams (BDDs), and on the specification of query constraints to avoid including the evaluation of queries that do not represent a valid state of the system. We illustrate our approach on two real-world case studies, which would be intractable with the original method and are analyzed in seconds with our method.
基于属性的访问控制(ABAC)的一个主要挑战是对缺失信息的处理。一些研究表明,标准ABAC机制(例如XACML)处理缺失信息的方式存在缺陷,使得ABAC策略容易受到属性隐藏攻击。最近的工作通过引入扩展求值的概念解决了ABAC中信息缺失的问题,其中查询的求值考虑了扩展该查询的所有可能方法。该方法可以对抗属性隐藏攻击,但是幼稚的实现是难以处理的,因为它需要对整个查询空间进行评估。在本文中,我们提出了一种高效的扩展ABAC评估方法,该方法依赖于ABAC策略编码为多个二进制决策图(bdd),并依赖于查询约束的规范,以避免包括不代表系统有效状态的查询的评估。我们在两个现实世界的案例研究中说明了我们的方法,用原始方法是难以处理的,用我们的方法可以在几秒钟内进行分析。
{"title":"Efficient Extended ABAC Evaluation","authors":"C. Morisset, T. Willemse, Nicola Zannone","doi":"10.1145/3205977.3205980","DOIUrl":"https://doi.org/10.1145/3205977.3205980","url":null,"abstract":"A main challenge of attribute-based access control (ABAC) is the handling of missing information. Several studies show that the way standard ABAC mechanisms (e.g., XACML) handle missing information is flawed, making ABAC policies vulnerable to attribute-hiding attacks. Recent work addressed the problem of missing information in ABAC by introducing the notion of extended evaluation, where the evaluation of a query considers all possible ways of extending that query. This method counters attribute-hiding attacks, but a naive implementation is intractable, as it requires an evaluation of the whole query space. In this paper, we present an efficient extended ABAC evaluation method that relies on the encoding of ABAC policies as multiple Binary Decision Diagrams (BDDs), and on the specification of query constraints to avoid including the evaluation of queries that do not represent a valid state of the system. We illustrate our approach on two real-world case studies, which would be intractable with the original method and are analyzed in seconds with our method.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134613097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study 物联网访问控制即服务(ACaaS)的惰性方法:AWS案例研究
Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone
The Internet of Things (IoT) is receiving considerable attention from both industry and academia because of the new business models that it enables and the new security and privacy challenges that it generates. Major Cloud Service Providers (CSPs) have proposed platforms to support IoT by combining cloud and edge computing. However, the security mechanisms available in the cloud have been extended to IoT with some shortcomings with respect to the management and enforcement of access control policies. Access Control as a Service (ACaaS) is emerging as a solution to overcome these difficulties. The paper proposes a lazy approach to ACaaS that allows the specification and management of policies independently of the CSP while leveraging its enforcement mechanisms. We demonstrate the approach by investigating (also experimentally) alternative deployments in the IoT platform offered by Amazon Web Services on a realistic smart lock solution.
物联网(IoT)正受到工业界和学术界的广泛关注,因为它实现了新的商业模式,并产生了新的安全和隐私挑战。主要的云服务提供商(csp)已经提出了通过结合云和边缘计算来支持物联网的平台。然而,云中可用的安全机制已经扩展到物联网,在访问控制策略的管理和执行方面存在一些缺点。访问控制即服务(ACaaS)作为克服这些困难的解决方案正在出现。本文提出了一种懒惰的ACaaS方法,允许独立于CSP的策略规范和管理,同时利用其实施机制。我们通过在一个现实的智能锁解决方案上调查(也通过实验)亚马逊网络服务提供的物联网平台中的替代部署来演示这种方法。
{"title":"A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study","authors":"Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone","doi":"10.1145/3205977.3205989","DOIUrl":"https://doi.org/10.1145/3205977.3205989","url":null,"abstract":"The Internet of Things (IoT) is receiving considerable attention from both industry and academia because of the new business models that it enables and the new security and privacy challenges that it generates. Major Cloud Service Providers (CSPs) have proposed platforms to support IoT by combining cloud and edge computing. However, the security mechanisms available in the cloud have been extended to IoT with some shortcomings with respect to the management and enforcement of access control policies. Access Control as a Service (ACaaS) is emerging as a solution to overcome these difficulties. The paper proposes a lazy approach to ACaaS that allows the specification and management of policies independently of the CSP while leveraging its enforcement mechanisms. We demonstrate the approach by investigating (also experimentally) alternative deployments in the IoT platform offered by Amazon Web Services on a realistic smart lock solution.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134613213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks 我的朋友泄露了我的隐私:社交网络中的隐私建模与分析
Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo
With the dramatically increasing participation in online social networks (OSNs), huge amount of private information becomes available on such sites. It is critical to preserve users' privacy without preventing them from socialization and sharing. Unfortunately, existing solutions fall short meeting such requirements. We argue that the key component of OSN privacy protection is protecting (sensitive) content -- privacy as having the ability to control information dissemination. We follow the concepts of private information boundaries and restricted access and limited control to introduce a social circle model. We articulate the formal constructs of this model and the desired properties for privacy protection in the model. We show that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization. We then utilize this model to analyze the most popular social network platforms on the Internet (Facebook, Google+, WeChat, etc), and demonstrate the potential privacy vulnerabilities in some social networks. Finally, we discuss the implications of the analysis, and possible future directions.
随着在线社交网络(OSNs)的参与急剧增加,大量的私人信息可以在这些网站上获得。在不阻止用户进行社交和分享的情况下保护他们的隐私至关重要。不幸的是,现有的解决方案无法满足这些需求。我们认为OSN隐私保护的关键部分是保护(敏感)内容——隐私具有控制信息传播的能力。我们遵循私人信息边界和限制访问和限制控制的概念,引入社交圈模型。我们阐明了该模型的形式化构造和模型中隐私保护所需的属性。我们证明了社交圈模式是高效且实用的,在为用户提供一定程度的隐私保护能力的同时,仍然有利于社交。然后,我们利用该模型分析了互联网上最流行的社交网络平台(Facebook,谷歌+,微信等),并展示了一些社交网络中潜在的隐私漏洞。最后,我们讨论了分析的意义,以及可能的未来方向。
{"title":"My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks","authors":"Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo","doi":"10.1145/3205977.3205981","DOIUrl":"https://doi.org/10.1145/3205977.3205981","url":null,"abstract":"With the dramatically increasing participation in online social networks (OSNs), huge amount of private information becomes available on such sites. It is critical to preserve users' privacy without preventing them from socialization and sharing. Unfortunately, existing solutions fall short meeting such requirements. We argue that the key component of OSN privacy protection is protecting (sensitive) content -- privacy as having the ability to control information dissemination. We follow the concepts of private information boundaries and restricted access and limited control to introduce a social circle model. We articulate the formal constructs of this model and the desired properties for privacy protection in the model. We show that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization. We then utilize this model to analyze the most popular social network platforms on the Internet (Facebook, Google+, WeChat, etc), and demonstrate the potential privacy vulnerabilities in some social networks. Finally, we discuss the implications of the analysis, and possible future directions.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Multi-Party Access Control: Requirements, State of the Art and Open Challenges 多方访问控制:需求、技术现状和公开挑战
A. Squicciarini, S. Rajtmajer, Nicola Zannone
Multi-party access control is gaining attention and prominence within the community, as access control models and systems are faced with complex, jointly-owned and jointly-managed content. Traditional single-user approaches lack the richness and flexibility to accommodate these scenarios, resulting in undesired disclosure of sensitive data and resources. Moving forward fundamental work in this area is critical. In particular, as personal data amasses and algorithms for data mining improve, personally identifiable information is more readily inferred and the practical implications of privacy decisions are relatively opaque. This is true even at the individual level, but the parallel problem for jointly managed content involves the cross product of these complex outcomes. In this presentation, we discuss fundamental requirements of successful multi-party access control mechanisms and contextualize these concepts with respect to the state of the art. Based on this analysis, we identify open challenges and draw a roadmap for future work.
由于访问控制模型和系统面临着复杂的、共同拥有和共同管理的内容,多方访问控制越来越受到社会的关注和重视。传统的单用户方法缺乏适应这些场景的丰富性和灵活性,导致不希望的敏感数据和资源泄露。推进这一领域的基础性工作至关重要。特别是,随着个人数据的积累和数据挖掘算法的改进,个人身份信息更容易推断出来,隐私决策的实际影响相对不透明。即使在个人层面上也是如此,但是共同管理内容的并行问题涉及到这些复杂结果的交叉乘积。在本次演讲中,我们将讨论成功的多方访问控制机制的基本要求,并将这些概念与当前的技术状况联系起来。基于这一分析,我们确定了开放的挑战,并为未来的工作绘制了路线图。
{"title":"Multi-Party Access Control: Requirements, State of the Art and Open Challenges","authors":"A. Squicciarini, S. Rajtmajer, Nicola Zannone","doi":"10.1145/3205977.3205999","DOIUrl":"https://doi.org/10.1145/3205977.3205999","url":null,"abstract":"Multi-party access control is gaining attention and prominence within the community, as access control models and systems are faced with complex, jointly-owned and jointly-managed content. Traditional single-user approaches lack the richness and flexibility to accommodate these scenarios, resulting in undesired disclosure of sensitive data and resources. Moving forward fundamental work in this area is critical. In particular, as personal data amasses and algorithms for data mining improve, personally identifiable information is more readily inferred and the practical implications of privacy decisions are relatively opaque. This is true even at the individual level, but the parallel problem for jointly managed content involves the cross product of these complex outcomes. In this presentation, we discuss fundamental requirements of successful multi-party access control mechanisms and contextualize these concepts with respect to the state of the art. Based on this analysis, we identify open challenges and draw a roadmap for future work.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132035515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A blockchain-based Trust System for the Internet of Things 基于区块链的物联网信任体系
R. D. Pietro, Xavier Salleras, Matteo Signorini, Erez Waisbard
One of the biggest challenges for the Internet of Things (IoT) is to bridge the currently fragmented trust domains. The traditional PKI model relies on a common root of trust and does not fit well with the heterogeneous IoT ecosystem where constrained devices belong to independent administrative domains. In this work we describe a distributed trust model for the IoT that leverages the existing trust domains and bridges them to create end-to-end trust between IoT devices without relying on any common root of trust. Furthermore we define a new cryptographic primitive, denoted as obligation chain designed as a credit-based Blockchain with a built-in reputation mechanism. Its innovative design enables a wide range of use cases and business models that are simply not possible with current Blockchain-based solutions while not experiencing traditional blockchain delays. We provide a security analysis for both the obligation chain and the overall architecture and provide experimental tests that show its viability and quality.
物联网(IoT)面临的最大挑战之一是弥合目前分散的信任域。传统的PKI模型依赖于一个共同的信任根,不适合异构物联网生态系统,其中受约束的设备属于独立的管理域。在这项工作中,我们描述了物联网的分布式信任模型,该模型利用现有的信任域并桥接它们以在物联网设备之间创建端到端信任,而不依赖于任何共同的信任根。此外,我们定义了一个新的加密原语,称为义务链,设计为基于信用的区块链,具有内置的声誉机制。它的创新设计实现了广泛的用例和商业模式,这些用目前基于区块链的解决方案根本无法实现,同时不会经历传统的区块链延迟。我们提供了义务链和整体架构的安全性分析,并提供了实验测试,以证明其可行性和质量。
{"title":"A blockchain-based Trust System for the Internet of Things","authors":"R. D. Pietro, Xavier Salleras, Matteo Signorini, Erez Waisbard","doi":"10.1145/3205977.3205993","DOIUrl":"https://doi.org/10.1145/3205977.3205993","url":null,"abstract":"One of the biggest challenges for the Internet of Things (IoT) is to bridge the currently fragmented trust domains. The traditional PKI model relies on a common root of trust and does not fit well with the heterogeneous IoT ecosystem where constrained devices belong to independent administrative domains. In this work we describe a distributed trust model for the IoT that leverages the existing trust domains and bridges them to create end-to-end trust between IoT devices without relying on any common root of trust. Furthermore we define a new cryptographic primitive, denoted as obligation chain designed as a credit-based Blockchain with a built-in reputation mechanism. Its innovative design enables a wide range of use cases and business models that are simply not possible with current Blockchain-based solutions while not experiencing traditional blockchain delays. We provide a security analysis for both the obligation chain and the overall architecture and provide experimental tests that show its viability and quality.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Independent Key Distribution Protocols for Broadcast Authentication 广播认证的独立密钥分发协议
Bruhadeshwar Bezawada, S. Kulkarni, I. Ray, I. Ray, Ruiping Li
Broadcast authentication is an important problem in several network settings such as wireless sensor networks and ad-hoc networks. We focus on the problem of independent key distribution protocols, which use efficient symmetric key signatures in distributed systems to permit (local) broadcast authentication. We focus on five types of communication graphs: (1) star, (2) acyclic, (3) planar, (4) complete bipartite, and (5) fully connected graphs. A star graph is the simplest network topology where a central node is transmitting authenticated broadcast messages to several satellite nodes. For star graphs, we show that as n, the number of satellite nodes in the star network, tends to infinity, it suffices to maintain logn+1/2loglogn + 1 keys at the center node, but logn+1/2loglogn keys do not suffice. We establish that this is the optimal lower bound on the number of keys for a star graph. Building on this result, we describe storage efficient key distribution for acyclic, planar, and complete bipartite graphs, when compared to existing key distribution schemes. We extend our scheme for fully connected graphs and show that it is sufficient to store O(c log2 N) keys per node where c<1. We perform a detailed analysis of collusion resistance of our protocols and show the trade-offs against internal and external attacks depending on the size of storage. Finally, we demonstrate the practical applicability of our protocols for wireless sensor networks.
在无线传感器网络和ad-hoc网络中,广播认证是一个非常重要的问题。我们重点研究了独立密钥分发协议的问题,该协议在分布式系统中使用有效的对称密钥签名来允许(本地)广播认证。我们关注五种类型的通信图:(1)星图,(2)无环图,(3)平面图,(4)完全二部图,(5)完全连通图。星图是最简单的网络拓扑结构,其中中心节点向几个卫星节点传输经过身份验证的广播消息。对于星图,我们证明了当星形网络的卫星节点数目n趋于无穷大时,在中心节点上维持logn+1/2loglogn +1个键是足够的,但logn+1/2loglogn键是不够的。我们证明了这是星图键数的最优下界。在此结果的基础上,我们描述了与现有密钥分配方案相比,非环图、平面图和完全二部图的存储效率密钥分配。我们将该方案扩展到全连通图,并证明在c<1的节点上存储O(c log2 N)个键是足够的。我们对协议的抗勾结性进行了详细的分析,并显示了根据存储大小对内部和外部攻击的权衡。最后,我们演示了我们的协议在无线传感器网络中的实际适用性。
{"title":"Independent Key Distribution Protocols for Broadcast Authentication","authors":"Bruhadeshwar Bezawada, S. Kulkarni, I. Ray, I. Ray, Ruiping Li","doi":"10.1145/3205977.3205985","DOIUrl":"https://doi.org/10.1145/3205977.3205985","url":null,"abstract":"Broadcast authentication is an important problem in several network settings such as wireless sensor networks and ad-hoc networks. We focus on the problem of independent key distribution protocols, which use efficient symmetric key signatures in distributed systems to permit (local) broadcast authentication. We focus on five types of communication graphs: (1) star, (2) acyclic, (3) planar, (4) complete bipartite, and (5) fully connected graphs. A star graph is the simplest network topology where a central node is transmitting authenticated broadcast messages to several satellite nodes. For star graphs, we show that as n, the number of satellite nodes in the star network, tends to infinity, it suffices to maintain logn+1/2loglogn + 1 keys at the center node, but logn+1/2loglogn keys do not suffice. We establish that this is the optimal lower bound on the number of keys for a star graph. Building on this result, we describe storage efficient key distribution for acyclic, planar, and complete bipartite graphs, when compared to existing key distribution schemes. We extend our scheme for fully connected graphs and show that it is sufficient to store O(c log2 N) keys per node where c<1. We perform a detailed analysis of collusion resistance of our protocols and show the trade-offs against internal and external attacks depending on the size of storage. Finally, we demonstrate the practical applicability of our protocols for wireless sensor networks.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mining Positive and Negative Attribute-Based Access Control Policy Rules 基于正、负属性的访问控制策略规则挖掘
Padmavathi Iyer, A. Masoumzadeh
Mining access control policies can reduce the burden of adopting more modern access control models by automating the process of generating policies based on existing authorization information in a system. Previous work in this area has focused on mining positive authorizations only. That includes the literature on mining role-based access control policies (which are naturally about positive authorization) and even more recent work on mining attribute-based access control (ABAC) policies. However, various theoretical access control models (including ABAC), specification standards (such as XACML), and implementations (such as operating systems and databases) support negative authorization as well as positive authorization. In this paper, we propose a novel approach to mine ABAC policies that may contain both positive and negative authorization rules. We evaluate our approach using two different policies in terms of correctness, quality of rules (conciseness), and time. We show that while achieving the new goal of supporting negative authorizations, our proposed algorithm outperforms existing approach to ABAC mining in terms of time.
挖掘访问控制策略可以根据系统中现有的授权信息自动生成策略,从而减轻采用更现代的访问控制模型的负担。这一领域以前的工作只侧重于挖掘积极的授权。这包括关于挖掘基于角色的访问控制策略(自然是关于积极授权的)的文献,以及最近关于挖掘基于属性的访问控制(ABAC)策略的工作。但是,各种理论访问控制模型(包括ABAC)、规范标准(如XACML)和实现(如操作系统和数据库)既支持负授权,也支持正授权。在本文中,我们提出了一种新的方法来挖掘可能包含正授权规则和负授权规则的ABAC策略。我们在正确性、规则质量(简洁性)和时间方面使用两种不同的策略来评估我们的方法。我们表明,在实现支持负面授权的新目标的同时,我们提出的算法在时间方面优于现有的ABAC挖掘方法。
{"title":"Mining Positive and Negative Attribute-Based Access Control Policy Rules","authors":"Padmavathi Iyer, A. Masoumzadeh","doi":"10.1145/3205977.3205988","DOIUrl":"https://doi.org/10.1145/3205977.3205988","url":null,"abstract":"Mining access control policies can reduce the burden of adopting more modern access control models by automating the process of generating policies based on existing authorization information in a system. Previous work in this area has focused on mining positive authorizations only. That includes the literature on mining role-based access control policies (which are naturally about positive authorization) and even more recent work on mining attribute-based access control (ABAC) policies. However, various theoretical access control models (including ABAC), specification standards (such as XACML), and implementations (such as operating systems and databases) support negative authorization as well as positive authorization. In this paper, we propose a novel approach to mine ABAC policies that may contain both positive and negative authorization rules. We evaluate our approach using two different policies in terms of correctness, quality of rules (conciseness), and time. We show that while achieving the new goal of supporting negative authorizations, our proposed algorithm outperforms existing approach to ABAC mining in terms of time.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
HCAP: A History-Based Capability System for IoT Devices HCAP:基于历史的物联网设备能力系统
Lakshya Tandon, Philip W. L. Fong, R. Safavi-Naini
Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constraints shall be imposed on permission usage so as to realize the Principle of Least Privilege. Since IoT devices are physically embedded, they are often accessed in a particular sequence based on their relative physical positions. Monitoring if such sequencing constraints are honoured when IoT devices are accessed provides a means to fence off malicious accesses. This paper proposes a history-based capability system, HCAP, for enforcing permission sequencing constraints in a distributed authorization environment. We formally establish the security guarantees of HCAP, and empirically evaluate its performance.
在物联网(IoT)应用程序中,权限是高度敏感的,因为物联网设备收集我们的个人数据并控制我们环境的安全。不是简单地授予权限,而是对权限的使用进行进一步的约束,从而实现最小权限原则。由于物联网设备是物理嵌入的,因此通常根据其相对物理位置以特定顺序访问它们。当物联网设备被访问时,监控这些排序约束是否得到遵守,提供了一种阻止恶意访问的手段。本文提出了一种基于历史的能力系统HCAP,用于在分布式授权环境中执行权限排序约束。我们正式建立了HCAP的安全保障,并对其性能进行了实证评价。
{"title":"HCAP: A History-Based Capability System for IoT Devices","authors":"Lakshya Tandon, Philip W. L. Fong, R. Safavi-Naini","doi":"10.1145/3205977.3205978","DOIUrl":"https://doi.org/10.1145/3205977.3205978","url":null,"abstract":"Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constraints shall be imposed on permission usage so as to realize the Principle of Least Privilege. Since IoT devices are physically embedded, they are often accessed in a particular sequence based on their relative physical positions. Monitoring if such sequencing constraints are honoured when IoT devices are accessed provides a means to fence off malicious accesses. This paper proposes a history-based capability system, HCAP, for enforcing permission sequencing constraints in a distributed authorization environment. We formally establish the security guarantees of HCAP, and empirically evaluate its performance.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies 第23届ACM访问控制模型和技术研讨会论文集
X. S. Wang, Lujo Bauer, F. Kerschbaum
It is our great pleasure to welcome you to the ACM Symposium on Access Control Models and Technologies (SACMAT 2016), taking place in Shanghai, China, on June 6-8, 2016. This is the 21st edition of the symposium series, continuing the tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control in terms of models, systems, applications, and theory. The symposium aims to share novel access control solutions that fulfill the needs of heterogeneous applications and environments, and to identify new directions for future research and development. SACMAT provides researchers and practitioners with a unique opportunity to share their perspectives with others interested in the various aspects of access control, aside from visiting the various attractions offered by the big international metropolis Shanghai. This year, 55 abstracts and papers were submitted from a variety of countries around the world. Submissions were anonymous; each paper has been reviewed by at least three reviewers who are experts in the field. Extensive online discussions took place to make the selections for the symposium. The program committee finally accepted 18 papers as full papers and 3 papers as short ones for presentation at the symposium. The topics covered include network and mobile access control, access control in applications, policy engineering, access control specification and access control enforcement. In addition to the main research paper sessions, the symposium offers a panel discussion session entitled "Security and privacy in the era of Internet of Things: research opportunities and challenges", and a poster session. Above all, the conference proudly presents three exciting keynote talks by Virgil Gligor of Carnegie Mellon University, Bhavani Thuraisingham of University of Texas at Dallas, and Robert Deng of Singapore Management University, respectively.
我们非常高兴地欢迎您参加于2016年6月6日至8日在中国上海举行的ACM访问控制模型与技术研讨会(SACMAT 2016)。这是该系列研讨会的第21届,延续了作为主要论坛的传统,在模型、系统、应用和理论方面介绍访问控制前沿问题的研究成果和经验报告。研讨会旨在分享满足异构应用和环境需求的新颖访问控制解决方案,并确定未来研究和发展的新方向。SACMAT为研究人员和从业人员提供了一个独特的机会,除了参观国际大都市上海提供的各种景点外,还可以与其他对门禁各个方面感兴趣的人分享他们的观点。今年,来自世界各地的55个国家提交了摘要和论文。提交的意见是匿名的;每篇论文至少由三名该领域的专家审阅。在网上进行了广泛的讨论,以选出研讨会的候选人。项目委员会最终接受了18篇论文作为全文,3篇论文作为短文在研讨会上发表。涵盖的主题包括网络和移动访问控制、应用中的访问控制、策略工程、访问控制规范和访问控制实施。除了主要的研究论文环节外,研讨会还设有“物联网时代的安全与隐私:研究机遇与挑战”的小组讨论环节和海报环节。最重要的是,会议自豪地介绍了卡内基梅隆大学的维吉尔·格利戈尔、德克萨斯大学达拉斯分校的巴瓦尼·图莱辛厄姆和新加坡管理大学的罗伯特·邓的三场激动人心的主题演讲。
{"title":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","authors":"X. S. Wang, Lujo Bauer, F. Kerschbaum","doi":"10.1145/3205977","DOIUrl":"https://doi.org/10.1145/3205977","url":null,"abstract":"It is our great pleasure to welcome you to the ACM Symposium on Access Control Models and Technologies (SACMAT 2016), taking place in Shanghai, China, on June 6-8, 2016. This is the 21st edition of the symposium series, continuing the tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control in terms of models, systems, applications, and theory. The symposium aims to share novel access control solutions that fulfill the needs of heterogeneous applications and environments, and to identify new directions for future research and development. SACMAT provides researchers and practitioners with a unique opportunity to share their perspectives with others interested in the various aspects of access control, aside from visiting the various attractions offered by the big international metropolis Shanghai. \u0000 \u0000This year, 55 abstracts and papers were submitted from a variety of countries around the world. Submissions were anonymous; each paper has been reviewed by at least three reviewers who are experts in the field. Extensive online discussions took place to make the selections for the symposium. The program committee finally accepted 18 papers as full papers and 3 papers as short ones for presentation at the symposium. The topics covered include network and mobile access control, access control in applications, policy engineering, access control specification and access control enforcement. \u0000 \u0000In addition to the main research paper sessions, the symposium offers a panel discussion session entitled \"Security and privacy in the era of Internet of Things: research opportunities and challenges\", and a poster session. Above all, the conference proudly presents three exciting keynote talks by Virgil Gligor of Carnegie Mellon University, Bhavani Thuraisingham of University of Texas at Dallas, and Robert Deng of Singapore Management University, respectively.","PeriodicalId":423087,"journal":{"name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1