首页 > 最新文献

ACM Transactions on Information and System Security最新文献

英文 中文
Authorization recycling in hierarchical RBAC systems 分级RBAC系统中的授权回收
Q Engineering Pub Date : 2011-05-01 DOI: 10.1145/1952982.1952985
Qiang Wei, J. Crampton, K. Beznosov, M. Ripeanu
As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization caching, which enables the reuse of previous authorization decisions, is one technique that has been used to address these challenges. This article introduces and evaluates the mechanisms for authorization “recycling” in RBAC enterprise systems. The algorithms that support these mechanisms allow making precise and approximate authorization decisions, thereby masking possible failures of the authorization server and reducing its load. We evaluate these algorithms analytically as well as using simulation and a prototype implementation. Our evaluation results demonstrate that authorization recycling can improve the performance of distributed-access control mechanisms.
随着分布式应用程序的规模和复杂性的增加,基于专用授权服务器的传统授权体系结构变得越来越脆弱,因为这个决策点代表了单点故障和性能瓶颈。授权缓存支持重用以前的授权决策,这是一种用于解决这些挑战的技术。本文介绍并评估了RBAC企业系统中的授权“回收”机制。支持这些机制的算法允许做出精确和近似的授权决策,从而掩盖授权服务器可能出现的故障并减少其负载。我们对这些算法进行了分析评估,并使用了仿真和原型实现。我们的评估结果表明,授权回收可以提高分布式访问控制机制的性能。
{"title":"Authorization recycling in hierarchical RBAC systems","authors":"Qiang Wei, J. Crampton, K. Beznosov, M. Ripeanu","doi":"10.1145/1952982.1952985","DOIUrl":"https://doi.org/10.1145/1952982.1952985","url":null,"abstract":"As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization caching, which enables the reuse of previous authorization decisions, is one technique that has been used to address these challenges.\u0000 This article introduces and evaluates the mechanisms for authorization “recycling” in RBAC enterprise systems. The algorithms that support these mechanisms allow making precise and approximate authorization decisions, thereby masking possible failures of the authorization server and reducing its load. We evaluate these algorithms analytically as well as using simulation and a prototype implementation. Our evaluation results demonstrate that authorization recycling can improve the performance of distributed-access control mechanisms.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78042044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Nexus authorization logic (NAL): Design rationale and applications Nexus授权逻辑(NAL):设计原理和应用程序
Q Engineering Pub Date : 2011-05-01 DOI: 10.1145/1952982.1952990
F. Schneider, Kevin Walsh, E. G. Sirer
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends prior access control logics that are based on “says” and “speaks for” operators. NAL enables authorization of access requests to depend on (i) the source or pedigree of the requester, (ii) the outcome of any mechanized analysis of the requester, or (iii) the use of trusted software to encapsulate or modify the requester. To illustrate the convenience and expressive power of this approach to authorization, a suite of document-viewer applications was implemented to run on the Nexus operating system. One of the viewers enforces policies that concern the integrity of excerpts that a document contains; another viewer enforces confidentiality policies specified by labels tagging blocks of text.
Nexus授权逻辑(NAL)为指定和推理凭证和授权策略提供了一个有原则的基础。它扩展了基于“说”和“说”操作符的优先访问控制逻辑。NAL允许访问请求的授权依赖于(i)请求者的来源或血统,(ii)对请求者的任何机械化分析的结果,或(iii)使用可信软件来封装或修改请求者。为了说明这种授权方法的便利性和表现力,实现了一套在Nexus操作系统上运行的文档查看器应用程序。其中一个查看器执行与文档包含的摘录的完整性有关的策略;另一个查看器执行通过标记文本块的标签指定的机密策略。
{"title":"Nexus authorization logic (NAL): Design rationale and applications","authors":"F. Schneider, Kevin Walsh, E. G. Sirer","doi":"10.1145/1952982.1952990","DOIUrl":"https://doi.org/10.1145/1952982.1952990","url":null,"abstract":"Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends prior access control logics that are based on “says” and “speaks for” operators. NAL enables authorization of access requests to depend on (i) the source or pedigree of the requester, (ii) the outcome of any mechanized analysis of the requester, or (iii) the use of trusted software to encapsulate or modify the requester. To illustrate the convenience and expressive power of this approach to authorization, a suite of document-viewer applications was implemented to run on the Nexus operating system. One of the viewers enforces policies that concern the integrity of excerpts that a document contains; another viewer enforces confidentiality policies specified by labels tagging blocks of text.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84265328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Practical defenses against pollution attacks in wireless network coding 无线网络编码中对污染攻击的实用防御
Q Engineering Pub Date : 2011-05-01 DOI: 10.1145/1952982.1952989
Jing Dong, Reza Curtmola, C. Nita-Rotaru
Recent studies have shown that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and lower power consumption. The core principle of network coding is that intermediate nodes actively mix input packets to produce output packets. This mixing subjects network coding systems to a severe security threat, known as a pollution attack, where attacker nodes inject corrupted packets into the network. Corrupted packets propagate in an epidemic manner, depleting network resources and significantly decreasing throughput. Pollution attacks are particularly dangerous in wireless networks, where attackers can easily inject packets or compromise devices due to the increased network vulnerability. In this article, we address pollution attacks against network coding systems in wireless mesh networks. We demonstrate that previous solutions are impractical in wireless networks, incurring an unacceptable high degradation of throughput. We propose a lightweight scheme, DART, that uses time-based authentication in combination with random linear transformations to defend against pollution attacks. We further improve system performance and propose EDART, which enhances DART with an optimistic forwarding scheme. We also propose efficient attacker identification schemes for both DART and EDART that enable quick attacker isolation and the selection of attacker-free paths, achieving additional performance improvement. A detailed security analysis shows that the probability of a polluted packet passing our verification procedure is very low (less than 0.002% in typical settings). Performance results using the well-known MORE protocol and realistic link quality measurements from the Roofnet experimental testbed show that our schemes improve system performance over 20 times compared with previous solutions.
最近的研究表明,网络编码可以为网络协议提供显著的好处,例如增加吞吐量、减少网络拥塞、提高可靠性和降低功耗。网络编码的核心原理是中间节点主动混合输入报文产生输出报文。这种混合使网络编码系统面临严重的安全威胁,称为污染攻击,攻击者节点将损坏的数据包注入网络。损坏的数据包以流行病的方式传播,耗尽网络资源并显着降低吞吐量。污染攻击在无线网络中尤其危险,由于网络脆弱性的增加,攻击者可以很容易地注入数据包或破坏设备。在本文中,我们讨论了无线网状网络中针对网络编码系统的污染攻击。我们证明了以前的解决方案在无线网络中是不切实际的,会导致吞吐量的不可接受的高退化。我们提出了一种轻量级方案,DART,它使用基于时间的身份验证与随机线性转换相结合来防御污染攻击。我们进一步提高了系统性能,并提出了EDART,它通过乐观转发方案增强了DART。我们还为DART和EDART提出了有效的攻击者识别方案,可以快速隔离攻击者并选择无攻击者的路径,从而实现额外的性能改进。详细的安全性分析表明,受污染的数据包通过我们的验证程序的概率非常低(在典型设置中小于0.002%)。使用知名的MORE协议和来自Roofnet实验测试平台的实际链路质量测量的性能结果表明,我们的方案与以前的解决方案相比,系统性能提高了20倍以上。
{"title":"Practical defenses against pollution attacks in wireless network coding","authors":"Jing Dong, Reza Curtmola, C. Nita-Rotaru","doi":"10.1145/1952982.1952989","DOIUrl":"https://doi.org/10.1145/1952982.1952989","url":null,"abstract":"Recent studies have shown that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and lower power consumption. The core principle of network coding is that intermediate nodes actively mix input packets to produce output packets. This mixing subjects network coding systems to a severe security threat, known as a pollution attack, where attacker nodes inject corrupted packets into the network. Corrupted packets propagate in an epidemic manner, depleting network resources and significantly decreasing throughput. Pollution attacks are particularly dangerous in wireless networks, where attackers can easily inject packets or compromise devices due to the increased network vulnerability.\u0000 In this article, we address pollution attacks against network coding systems in wireless mesh networks. We demonstrate that previous solutions are impractical in wireless networks, incurring an unacceptable high degradation of throughput. We propose a lightweight scheme, DART, that uses time-based authentication in combination with random linear transformations to defend against pollution attacks. We further improve system performance and propose EDART, which enhances DART with an optimistic forwarding scheme. We also propose efficient attacker identification schemes for both DART and EDART that enable quick attacker isolation and the selection of attacker-free paths, achieving additional performance improvement. A detailed security analysis shows that the probability of a polluted packet passing our verification procedure is very low (less than 0.002% in typical settings). Performance results using the well-known MORE protocol and realistic link quality measurements from the Roofnet experimental testbed show that our schemes improve system performance over 20 times compared with previous solutions.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74688949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Access control via belnap logic: Intuitive, expressive, and analyzable policy composition 通过belnap逻辑进行访问控制:直观、富有表现力和可分析的策略组合
Q Engineering Pub Date : 2011-05-01 DOI: 10.1145/1952982.1952991
G. Bruns, M. Huth
Access control to IT systems increasingly relies on the ability to compose policies. Hence there is benefit in any framework for policy composition that is intuitive, formal (and so “analyzable” and “implementable”), expressive, independent of specific application domains, and yet able to be extended to create domain-specific instances. Here we develop such a framework based on Belnap logic. An access-control policy is interpreted as a four-valued predicate that maps access requests to either grant, deny, conflict, or unspecified -- the four values of the Belnap bilattice. We define an expressive access-control policy language PBel, having composition operators based on the operators of Belnap logic. Natural orderings on policies are obtained by lifting the truth and information orderings of the Belnap bilattice. These orderings lead to a query language in which policy analyses, for example, conflict freedom, can be specified. Policy analysis is supported through a reduction of the validity of policy queries to the validity of propositional formulas on predicates over access requests. We evaluate our approach through firewall policy and RBAC policy examples, and discuss domain-specific and generic extensions of our policy language.
对IT系统的访问控制越来越依赖于组合策略的能力。因此,对于直观的、形式化的(因此是“可分析的”和“可实现的”)、富有表现力的、独立于特定应用程序领域的策略组合框架来说,任何框架都有好处,并且能够扩展以创建特定于领域的实例。在此,我们基于Belnap逻辑开发了这样一个框架。访问控制策略被解释为一个四值谓词,它将访问请求映射为授予、拒绝、冲突或未指定——即Belnap协议的四个值。我们定义了一种表达性的访问控制策略语言PBel,它具有基于Belnap逻辑运算符的组合运算符。通过提升贝尔纳普双边格的真序和信息序,得到了策略上的自然序。这些排序导致可以指定策略分析(例如冲突自由)的查询语言。通过将策略查询的有效性降低到访问请求上谓词上的命题公式的有效性来支持策略分析。我们通过防火墙策略和RBAC策略示例来评估我们的方法,并讨论策略语言的特定领域和通用扩展。
{"title":"Access control via belnap logic: Intuitive, expressive, and analyzable policy composition","authors":"G. Bruns, M. Huth","doi":"10.1145/1952982.1952991","DOIUrl":"https://doi.org/10.1145/1952982.1952991","url":null,"abstract":"Access control to IT systems increasingly relies on the ability to compose policies. Hence there is benefit in any framework for policy composition that is intuitive, formal (and so “analyzable” and “implementable”), expressive, independent of specific application domains, and yet able to be extended to create domain-specific instances. Here we develop such a framework based on Belnap logic. An access-control policy is interpreted as a four-valued predicate that maps access requests to either grant, deny, conflict, or unspecified -- the four values of the Belnap bilattice. We define an expressive access-control policy language PBel, having composition operators based on the operators of Belnap logic. Natural orderings on policies are obtained by lifting the truth and information orderings of the Belnap bilattice. These orderings lead to a query language in which policy analyses, for example, conflict freedom, can be specified. Policy analysis is supported through a reduction of the validity of policy queries to the validity of propositional formulas on predicates over access requests. We evaluate our approach through firewall policy and RBAC policy examples, and discuss domain-specific and generic extensions of our policy language.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87030394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Attribute-Based Messaging: Access Control and Confidentiality 基于属性的消息传递:访问控制和机密性
Q Engineering Pub Date : 2010-12-01 DOI: 10.1145/1880022.1880025
R. Bobba, Omid Fatemieh, Fariba Khan, A. Khan, Carl A. Gunter, H. Khurana, M. Prabhakaran
Attribute-Based Messaging (ABM) enables messages to be addressed using attributes of recipients rather than an explicit list of recipients. Such messaging offers benefits of efficiency, exclusiveness, and intensionality, but faces challenges in access control and confidentiality. In this article we explore an approach to intraenterprise ABM based on providing access control and confidentiality using information from the same attribute database exploited by the addressing scheme. We show how to address three key challenges. First, we demonstrate a manageable access control system based on attributes. Second, we demonstrate use of attribute-based encryption to provide end-to-end confidentiality. Third, we show that such a system can be efficient enough to support ABM for mid-size enterprises. Our implementation can dispatch confidential ABM messages approved by XACML policy review for an enterprise of at least 60,000 users with only seconds of latency.
基于属性的消息传递(ABM)允许使用收件人的属性而不是显式的收件人列表对消息进行寻址。这种消息传递提供了效率、排他性和密集性的好处,但在访问控制和机密性方面面临挑战。在本文中,我们探索了一种基于提供访问控制和机密性的企业内部ABM方法,该方法使用来自寻址方案所利用的相同属性数据库的信息。我们将展示如何解决三个关键挑战。首先,我们演示了一个基于属性的可管理访问控制系统。其次,我们将演示如何使用基于属性的加密来提供端到端的机密性。第三,我们证明了这样一个系统可以足够有效地支持中型企业的ABM。我们的实现可以为至少有60,000个用户的企业分派经XACML策略审查批准的机密ABM消息,延迟时间只有几秒钟。
{"title":"Attribute-Based Messaging: Access Control and Confidentiality","authors":"R. Bobba, Omid Fatemieh, Fariba Khan, A. Khan, Carl A. Gunter, H. Khurana, M. Prabhakaran","doi":"10.1145/1880022.1880025","DOIUrl":"https://doi.org/10.1145/1880022.1880025","url":null,"abstract":"Attribute-Based Messaging (ABM) enables messages to be addressed using attributes of recipients rather than an explicit list of recipients. Such messaging offers benefits of efficiency, exclusiveness, and intensionality, but faces challenges in access control and confidentiality. In this article we explore an approach to intraenterprise ABM based on providing access control and confidentiality using information from the same attribute database exploited by the addressing scheme. We show how to address three key challenges. First, we demonstrate a manageable access control system based on attributes. Second, we demonstrate use of attribute-based encryption to provide end-to-end confidentiality. Third, we show that such a system can be efficient enough to support ABM for mid-size enterprises. Our implementation can dispatch confidential ABM messages approved by XACML policy review for an enterprise of at least 60,000 users with only seconds of latency.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80460985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations 在IP加密语音对话中发现口语短语
Q Engineering Pub Date : 2010-12-01 DOI: 10.1145/1880022.1880029
C. V. Wright, L. Ballard, Scott E. Coull, F. Monrose, G. Masson
Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be encrypted to ensure confidentiality. However, we show that it is possible to identify the phrases spoken within encrypted VoIP calls when the audio is encoded using variable bit rate codecs. To do so, we train a hidden Markov model using only knowledge of the phonetic pronunciations of words, such as those provided by a dictionary, and search packet sequences for instances of specified phrases. Our approach does not require examples of the speaker’s voice, or even example recordings of the words that make up the target phrase. We evaluate our techniques on a standard speech recognition corpus containing over 2,000 phonetically rich phrases spoken by 630 distinct speakers from across the continental United States. Our results indicate that we can identify phrases within encrypted calls with an average accuracy of 50%, and with accuracy greater than 90% for some phrases. Clearly, such an attack calls into question the efficacy of current VoIP encryption standards. In addition, we examine the impact of various features of the underlying audio on our performance and discuss methods for mitigation.
虽然IP语音(VoIP)正在迅速被采用,但其安全含义尚未完全理解。由于VoIP呼叫可能穿越不受信任的网络,因此应该对数据包进行加密以确保机密性。然而,我们表明,当使用可变比特率编解码器对音频进行编码时,可以识别加密VoIP呼叫中所说的短语。为此,我们只使用单词的语音发音知识(例如由字典提供的单词)来训练隐藏马尔可夫模型,并搜索包序列以查找指定短语的实例。我们的方法不需要说话者声音的例子,甚至不需要组成目标短语的单词的例子录音。我们在一个标准语音识别语料库上评估我们的技术,该语料库包含来自美国大陆630个不同的说话者所说的2000多个语音丰富的短语。我们的结果表明,我们可以识别加密呼叫中的短语,平均准确率为50%,某些短语的准确率超过90%。显然,这样的攻击使人们对当前VoIP加密标准的有效性产生了质疑。此外,我们还研究了底层音频的各种特征对性能的影响,并讨论了缓解方法。
{"title":"Uncovering Spoken Phrases in Encrypted Voice over IP Conversations","authors":"C. V. Wright, L. Ballard, Scott E. Coull, F. Monrose, G. Masson","doi":"10.1145/1880022.1880029","DOIUrl":"https://doi.org/10.1145/1880022.1880029","url":null,"abstract":"Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be encrypted to ensure confidentiality. However, we show that it is possible to identify the phrases spoken within encrypted VoIP calls when the audio is encoded using variable bit rate codecs. To do so, we train a hidden Markov model using only knowledge of the phonetic pronunciations of words, such as those provided by a dictionary, and search packet sequences for instances of specified phrases. Our approach does not require examples of the speaker’s voice, or even example recordings of the words that make up the target phrase. We evaluate our techniques on a standard speech recognition corpus containing over 2,000 phonetically rich phrases spoken by 630 distinct speakers from across the continental United States. Our results indicate that we can identify phrases within encrypted calls with an average accuracy of 50%, and with accuracy greater than 90% for some phrases. Clearly, such an attack calls into question the efficacy of current VoIP encryption standards. In addition, we examine the impact of various features of the underlying audio on our performance and discuss methods for mitigation.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84758990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Mining Roles with Multiple Objectives 挖掘具有多个目标的角色
Q Engineering Pub Date : 2010-12-01 DOI: 10.1145/1880022.1880030
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, E. Bertino, S. Calo, Jorge Lobo
With the growing adoption of Role-Based Access Control (RBAC) in commercial security and identity management products, how to facilitate the process of migrating a non-RBAC system to an RBAC system has become a problem with significant business impact. Researchers have proposed to use data mining techniques to discover roles to complement the costly top-down approaches for RBAC system construction. An important problem is how to construct RBAC systems with low complexity. In this article, we define the notion of weighted structural complexity measure and propose a role mining algorithm that mines RBAC systems with low structural complexity. Another key problem that has not been adequately addressed by existing role mining approaches is how to discover roles with semantic meanings. In this article, we study the problem in two primary settings with different information availability. When the only information is user-permission relation, we propose to discover roles whose semantic meaning is based on formal concept lattices. We argue that the theory of formal concept analysis provides a solid theoretical foundation for mining roles from a user-permission relation. When user-attribute information is also available, we propose to create roles that can be explained by expressions of user-attributes. Since an expression of attributes describes a real-world concept, the corresponding role represents a real-world concept as well. Furthermore, the algorithms we propose balance the semantic guarantee of roles with system complexity. Finally, we indicate how to create a hybrid approach combining top-down candidate roles. Our experimental results demonstrate the effectiveness of our approaches.
随着商业安全和身份管理产品越来越多地采用基于角色的访问控制(RBAC),如何促进将非RBAC系统迁移到RBAC系统的过程已成为一个具有重大业务影响的问题。研究人员建议使用数据挖掘技术来发现角色,以补充RBAC系统构建中昂贵的自顶向下方法。一个重要的问题是如何构建低复杂度的RBAC系统。在本文中,我们定义了加权结构复杂度度量的概念,并提出了一种挖掘低结构复杂度RBAC系统的角色挖掘算法。现有角色挖掘方法没有充分解决的另一个关键问题是如何发现具有语义意义的角色。在本文中,我们研究了具有不同信息可用性的两种主要设置下的问题。当唯一的信息是用户-权限关系时,我们建议发现基于形式概念格的语义角色。我们认为形式概念分析理论为从用户-权限关系中挖掘角色提供了坚实的理论基础。当用户属性信息也可用时,我们建议创建可以用用户属性表达式解释的角色。由于属性的表达式描述了一个真实世界的概念,相应的角色也代表了一个真实世界的概念。此外,我们提出的算法在角色的语义保证和系统复杂性之间取得了平衡。最后,我们指出了如何创建结合自顶向下候选角色的混合方法。实验结果证明了该方法的有效性。
{"title":"Mining Roles with Multiple Objectives","authors":"Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, E. Bertino, S. Calo, Jorge Lobo","doi":"10.1145/1880022.1880030","DOIUrl":"https://doi.org/10.1145/1880022.1880030","url":null,"abstract":"With the growing adoption of Role-Based Access Control (RBAC) in commercial security and identity management products, how to facilitate the process of migrating a non-RBAC system to an RBAC system has become a problem with significant business impact. Researchers have proposed to use data mining techniques to discover roles to complement the costly top-down approaches for RBAC system construction. An important problem is how to construct RBAC systems with low complexity. In this article, we define the notion of weighted structural complexity measure and propose a role mining algorithm that mines RBAC systems with low structural complexity. Another key problem that has not been adequately addressed by existing role mining approaches is how to discover roles with semantic meanings. In this article, we study the problem in two primary settings with different information availability. When the only information is user-permission relation, we propose to discover roles whose semantic meaning is based on formal concept lattices. We argue that the theory of formal concept analysis provides a solid theoretical foundation for mining roles from a user-permission relation. When user-attribute information is also available, we propose to create roles that can be explained by expressions of user-attributes. Since an expression of attributes describes a real-world concept, the corresponding role represents a real-world concept as well. Furthermore, the algorithms we propose balance the semantic guarantee of roles with system complexity. Finally, we indicate how to create a hybrid approach combining top-down candidate roles. Our experimental results demonstrate the effectiveness of our approaches.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80354639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Storage-Based Intrusion Detection 基于存储的入侵检测
Q Engineering Pub Date : 2010-12-01 DOI: 10.1145/1880022.1880024
Adam G. Pennington, J. Griffin, John S. Bucy, J. Strunk, G. Ganger
Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions. Storage systems can spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. For example, examination of 18 real intrusion tools reveals that most (15) can be detected based on their changes to stored files. Further, an Intrusion Detection System (IDS) embedded in a storage device continues to operate even after client operating systems are compromised. We describe and evaluate a prototype storage IDS, built into a disk emulator, to demonstrate both feasibility and efficiency of storage-based intrusion detection. In particular, both the performance overhead (< 1%) and memory required (1.62MB for 13995 rules) are minimal.
基于存储的入侵检测是指存储系统监视和识别系统入侵的数据访问模式特征。存储系统可以发现几种常见的入侵者行为,例如添加后门、插入特洛伊木马和篡改审计日志。例如,对18个真实入侵工具的检查显示,大多数(15)可以根据它们对存储文件的更改来检测。此外,嵌入在存储设备中的入侵检测系统(IDS)即使在客户端操作系统受到威胁后也能继续运行。我们描述并评估了一个内置在磁盘模拟器中的存储IDS原型,以证明基于存储的入侵检测的可行性和效率。特别是,性能开销(< 1%)和所需内存(13995条规则1.62MB)都是最小的。
{"title":"Storage-Based Intrusion Detection","authors":"Adam G. Pennington, J. Griffin, John S. Bucy, J. Strunk, G. Ganger","doi":"10.1145/1880022.1880024","DOIUrl":"https://doi.org/10.1145/1880022.1880024","url":null,"abstract":"Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions. Storage systems can spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. For example, examination of 18 real intrusion tools reveals that most (15) can be detected based on their changes to stored files. Further, an Intrusion Detection System (IDS) embedded in a storage device continues to operate even after client operating systems are compromised. We describe and evaluate a prototype storage IDS, built into a disk emulator, to demonstrate both feasibility and efficiency of storage-based intrusion detection. In particular, both the performance overhead (< 1%) and memory required (1.62MB for 13995 rules) are minimal.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86433395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Satisfiability and Resiliency in Workflow Authorization Systems 工作流授权系统中的可满足性和弹性
Q Engineering Pub Date : 2010-12-01 DOI: 10.1145/1880022.1880034
Qihua Wang, Ninghui Li
We propose the role-and-relation-based access control (R2BAC) model for workflow authorization systems. In R2BAC, in addition to a user’s role memberships, the user’s relationships with other users help determine whether the user is allowed to perform a certain step in a workflow. For example, a constraint may require that two steps must not be performed by users who have conflicts of interests. We study computational complexity of the workflow satisfiability problem, which asks whether a set of users can complete a workflow. In particular, we apply tools from parameterized complexity theory to better understand the complexities of this problem. Furthermore, we reduce the workflow satisfiability problem to SAT and apply SAT solvers to address the problem. Experiments show that our algorithm can solve instances of reasonable size efficiently. Finally, it is sometimes not enough to ensure that a workflow can be completed in normal situations. We study the resiliency problem in workflow authorization systems, which asks whether a workflow can be completed even if a number of users may be absent. We formally define three levels of resiliency in workflow systems and study computational problems related to these notions of resiliency.
提出了基于角色和关系的工作流授权访问控制(R2BAC)模型。在R2BAC中,除了用户的角色成员关系外,用户与其他用户的关系还有助于确定是否允许用户执行工作流中的某个步骤。例如,约束可能要求有利益冲突的用户不能执行两个步骤。我们研究了工作流可满足性问题的计算复杂度,即一组用户是否能够完成一个工作流。特别是,我们应用参数化复杂性理论的工具来更好地理解这个问题的复杂性。此外,我们将工作流满意度问题简化为SAT,并应用SAT求解器来解决该问题。实验表明,该算法可以有效地求解合理大小的实例。最后,有时仅仅确保工作流在正常情况下能够完成是不够的。我们研究了工作流授权系统中的弹性问题,即工作流是否可以在多个用户缺席的情况下完成。我们正式定义了工作流系统中的三个弹性级别,并研究了与这些弹性概念相关的计算问题。
{"title":"Satisfiability and Resiliency in Workflow Authorization Systems","authors":"Qihua Wang, Ninghui Li","doi":"10.1145/1880022.1880034","DOIUrl":"https://doi.org/10.1145/1880022.1880034","url":null,"abstract":"We propose the role-and-relation-based access control (R2BAC) model for workflow authorization systems. In R2BAC, in addition to a user’s role memberships, the user’s relationships with other users help determine whether the user is allowed to perform a certain step in a workflow. For example, a constraint may require that two steps must not be performed by users who have conflicts of interests. We study computational complexity of the workflow satisfiability problem, which asks whether a set of users can complete a workflow. In particular, we apply tools from parameterized complexity theory to better understand the complexities of this problem. Furthermore, we reduce the workflow satisfiability problem to SAT and apply SAT solvers to address the problem. Experiments show that our algorithm can solve instances of reasonable size efficiently. Finally, it is sometimes not enough to ensure that a workflow can be completed in normal situations. We study the resiliency problem in workflow authorization systems, which asks whether a workflow can be completed even if a number of users may be absent. We formally define three levels of resiliency in workflow systems and study computational problems related to these notions of resiliency.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86497285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments 对抗环境下鲁棒分散虚拟坐标系统
Q Engineering Pub Date : 2010-12-01 DOI: 10.1145/1880022.1880032
David Zage, C. Nita-Rotaru
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all of the nodes in the network. Many of the proposed systems were designed with the assumption that all of the nodes are altruistic. However, this assumption may be violated by compromised nodes acting maliciously to degrade the accuracy of the coordinate system. As numerous peer-to-peer applications come to rely on virtual coordinate systems to achieve good performance, it is critical to address the security of such systems. In this work, we demonstrate the vulnerability of decentralized virtual coordinate systems to insider (or Byzantine) attacks. We propose techniques to make the coordinate assignment robust to malicious attackers without increasing the communication cost. We use both spatial and temporal correlations to perform context-sensitive outlier analysis to reject malicious updates and prevent unnecessary and erroneous adaptations. We demonstrate the attacks and mitigation techniques in the context of a well-known virtual coordinate system using simulations based on three representative, real-life Internet topologies of hosts and corresponding Round Trip Times (RTT). We show the effects of the attacks and the utility of the mitigation techniques on the virtual coordinate system as seen by higher-level applications, elucidating the utility of deploying robust virtual coordinate systems as network services.
虚拟坐标系统提供了一种准确而高效的服务,它允许Internet上的主机确定对任意主机的延迟,而无需主动监视网络中的所有节点。许多提出的系统都是在假设所有节点都是利他的情况下设计的。然而,这个假设可能会被恶意破坏的节点破坏,从而降低坐标系统的准确性。由于许多点对点应用程序开始依赖虚拟坐标系统来实现良好的性能,因此解决此类系统的安全性至关重要。在这项工作中,我们展示了分散的虚拟坐标系统对内部(或拜占庭)攻击的脆弱性。我们提出了在不增加通信开销的情况下使坐标分配对恶意攻击者具有鲁棒性的技术。我们使用空间和时间相关性来执行上下文敏感的离群值分析,以拒绝恶意更新并防止不必要和错误的调整。我们在一个众所周知的虚拟坐标系统的背景下演示了攻击和缓解技术,使用基于三种代表性的真实互联网主机拓扑和相应的往返时间(RTT)的模拟。我们从高级应用程序的角度展示了攻击的影响和缓解技术对虚拟坐标系统的效用,阐明了将健壮的虚拟坐标系统部署为网络服务的效用。
{"title":"Robust Decentralized Virtual Coordinate Systems in Adversarial Environments","authors":"David Zage, C. Nita-Rotaru","doi":"10.1145/1880022.1880032","DOIUrl":"https://doi.org/10.1145/1880022.1880032","url":null,"abstract":"Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all of the nodes in the network. Many of the proposed systems were designed with the assumption that all of the nodes are altruistic. However, this assumption may be violated by compromised nodes acting maliciously to degrade the accuracy of the coordinate system. As numerous peer-to-peer applications come to rely on virtual coordinate systems to achieve good performance, it is critical to address the security of such systems.\u0000 In this work, we demonstrate the vulnerability of decentralized virtual coordinate systems to insider (or Byzantine) attacks. We propose techniques to make the coordinate assignment robust to malicious attackers without increasing the communication cost. We use both spatial and temporal correlations to perform context-sensitive outlier analysis to reject malicious updates and prevent unnecessary and erroneous adaptations. We demonstrate the attacks and mitigation techniques in the context of a well-known virtual coordinate system using simulations based on three representative, real-life Internet topologies of hosts and corresponding Round Trip Times (RTT). We show the effects of the attacks and the utility of the mitigation techniques on the virtual coordinate system as seen by higher-level applications, elucidating the utility of deploying robust virtual coordinate systems as network services.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91350305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
ACM Transactions on Information and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1