首页 > 最新文献

Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Enabling intensional access control via preference-aware query optimization 通过偏好感知查询优化实现内向性访问控制
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu
Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evaluation. By allowing users to merely say what data they are interested in accessing without providing guidance regarding how to retrieve it, query optimizers can generate plans that leak sensitive query intension. To address these types of issues, we have created a framework that empowers users with the ability to specify access controls on the intension of their queries through extensions to the SQL SELECT statement. In this demonstration, we present a version of PostgreSQL's query optimizer that we have modified to produce plans that respect these constraints while optimizing user-specified SQL queries in terms of performance.
尽管SQL的声明性为数据库用户提供了很大的实用程序,但在分布式数据库管理系统中使用它可能会在查询评估过程中对用户隐私造成意想不到的后果。通过允许用户只说明他们感兴趣访问的数据,而不提供有关如何检索数据的指导,查询优化器可以生成泄露敏感查询意图的计划。为了解决这些类型的问题,我们创建了一个框架,使用户能够通过扩展SQL SELECT语句来指定对其查询的访问控制。在这个演示中,我们展示了PostgreSQL查询优化器的一个版本,我们修改了这个版本,以生成尊重这些约束的计划,同时从性能方面优化用户指定的SQL查询。
{"title":"Enabling intensional access control via preference-aware query optimization","authors":"Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu","doi":"10.1145/2462410.2462428","DOIUrl":"https://doi.org/10.1145/2462410.2462428","url":null,"abstract":"Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evaluation. By allowing users to merely say what data they are interested in accessing without providing guidance regarding how to retrieve it, query optimizers can generate plans that leak sensitive query intension. To address these types of issues, we have created a framework that empowers users with the ability to specify access controls on the intension of their queries through extensions to the SQL SELECT statement. In this demonstration, we present a version of PostgreSQL's query optimizer that we have modified to produce plans that respect these constraints while optimizing user-specified SQL queries in terms of performance.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"38 1","pages":"189-192"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87965328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ensuring continuous compliance through reconciling policy with usage 通过协调政策和使用情况来确保持续的合规
Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken
Organizations rarely define formal security properties or policies for their access control systems, often choosing to react to changing needs. This paper addresses the problem of reconciling entitlement usage with configured policies for multiple objectives: policy optimization and risk mitigation. Policies should remain up-to-date, maintaining least privilege, and using unambiguous constructs that reduce administrative stress. We describe a number of algorithms and heuristics, validated on real-world data, to address various aspects of reconciling access control policies with security audit logs. The first set of algorithms track and correlate which policy items enable which actions, using which we can identify over privileged entitlements, redundant policy items that may not be correctly revoked by administrators, rarely used entitlements, and overly permissive entitlements. They can help reduce administrative errors and general operational risk. The second body of work compares user groups defined in the policy with roles generated from the actual usage patterns, from which we derive quality and security measures for policy groups. Finally, we track policy changes through assignments and revocations and test precursors for such changes (e.g., a failed request before an assignment). Broadly speaking, this body of work presents different facets of continuous compliance to see if the enforced security policy and the resulting usage is consistent with a common intended security goal.
组织很少为他们的访问控制系统定义正式的安全属性或策略,经常选择对不断变化的需求做出反应。本文解决了为多个目标(策略优化和风险降低)协调授权使用与配置策略的问题。策略应该保持最新,维护最少的特权,并使用明确的结构来减少管理压力。我们描述了许多经过实际数据验证的算法和启发式方法,以解决协调访问控制策略与安全审计日志的各个方面。第一组算法跟踪并关联哪些策略项支持哪些操作,使用这些策略项我们可以识别特权过多的权利、可能无法被管理员正确撤销的冗余策略项、很少使用的权利和过度宽松的权利。它们可以帮助减少管理错误和一般操作风险。第二部分工作将策略中定义的用户组与从实际使用模式生成的角色进行比较,我们从实际使用模式中获得策略组的质量和安全度量。最后,我们通过分配和撤销来跟踪策略更改,并测试此类更改的前兆(例如,在分配之前失败的请求)。广义地说,此工作主体呈现了持续遵从性的不同方面,以查看强制执行的安全策略和结果使用是否与预期的公共安全目标一致。
{"title":"Ensuring continuous compliance through reconciling policy with usage","authors":"Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken","doi":"10.1145/2462410.2462417","DOIUrl":"https://doi.org/10.1145/2462410.2462417","url":null,"abstract":"Organizations rarely define formal security properties or policies for their access control systems, often choosing to react to changing needs. This paper addresses the problem of reconciling entitlement usage with configured policies for multiple objectives: policy optimization and risk mitigation. Policies should remain up-to-date, maintaining least privilege, and using unambiguous constructs that reduce administrative stress.\u0000 We describe a number of algorithms and heuristics, validated on real-world data, to address various aspects of reconciling access control policies with security audit logs. The first set of algorithms track and correlate which policy items enable which actions, using which we can identify over privileged entitlements, redundant policy items that may not be correctly revoked by administrators, rarely used entitlements, and overly permissive entitlements. They can help reduce administrative errors and general operational risk. The second body of work compares user groups defined in the policy with roles generated from the actual usage patterns, from which we derive quality and security measures for policy groups. Finally, we track policy changes through assignments and revocations and test precursors for such changes (e.g., a failed request before an assignment). Broadly speaking, this body of work presents different facets of continuous compliance to see if the enforced security policy and the resulting usage is consistent with a common intended security goal.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"74 1","pages":"49-60"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77343811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Heuristic safety analysis of access control models 访问控制模型的启发式安全性分析
Peter Amthor, Winfried E. Kühnhauser, Anja Pölck
Model-based security engineering uses formal security models for specifying and analyzing access control systems. Tool-based model analysis encounters a fundamental difficulty here: on the one hand, real-world access control systems generally are quite large and complex and require models that have high expressive power. On the other hand, analysis of such models is often pestered by computational complexity or even non-decidability, making it difficult to devise algorithms for automated analysis tools. One approach to this problem is to limiting the expressive power of the modeling calculus, resulting in restrictions to the spectrum of application scenarios that can be modeled. In this paper we propose a different approach: a heuristic-based method for analyzing the safety properties of access control models with full expressive power. Aiming at generality, the paper focuses on the lineage of HRU-style, automaton-based access control models that are fundamental for modeling the dynamic behavior of contemporary role-based or attribute-based access control systems. The paper motivates a heuristics-based approach to model analysis, describes in detail a heuristic model safety analysis algorithm, and discusses its computational complexity. The algorithm is the core of a security model analysis tool within the context of a security policy engineering workbench; a formal description of major components of its heuristic-based symbolic model execution engine is given, and its capacity to analyze complex real-world access control systems is evaluated.
基于模型的安全工程使用正式的安全模型来指定和分析访问控制系统。基于工具的模型分析在这里遇到了一个根本性的困难:一方面,现实世界的访问控制系统通常非常庞大和复杂,需要具有高表达能力的模型。另一方面,对这些模型的分析经常受到计算复杂性甚至不可判定性的困扰,这使得为自动分析工具设计算法变得困难。解决这个问题的一种方法是限制建模演算的表达能力,从而限制可以建模的应用程序场景的范围。在本文中,我们提出了一种不同的方法:基于启发式的方法来分析具有充分表达能力的访问控制模型的安全特性。针对通用性,本文重点研究了基于hru风格的基于自动机的访问控制模型的沿袭,这些模型是对当代基于角色或基于属性的访问控制系统的动态行为建模的基础。本文提出了一种基于启发式的模型分析方法,详细描述了启发式模型安全分析算法,并讨论了其计算复杂度。该算法是安全策略工程工作台中安全模型分析工具的核心;给出了其基于启发式的符号模型执行引擎的主要组成部分的形式化描述,并评估了其分析复杂现实世界访问控制系统的能力。
{"title":"Heuristic safety analysis of access control models","authors":"Peter Amthor, Winfried E. Kühnhauser, Anja Pölck","doi":"10.1145/2462410.2462413","DOIUrl":"https://doi.org/10.1145/2462410.2462413","url":null,"abstract":"Model-based security engineering uses formal security models for specifying and analyzing access control systems. Tool-based model analysis encounters a fundamental difficulty here: on the one hand, real-world access control systems generally are quite large and complex and require models that have high expressive power. On the other hand, analysis of such models is often pestered by computational complexity or even non-decidability, making it difficult to devise algorithms for automated analysis tools. One approach to this problem is to limiting the expressive power of the modeling calculus, resulting in restrictions to the spectrum of application scenarios that can be modeled. In this paper we propose a different approach: a heuristic-based method for analyzing the safety properties of access control models with full expressive power. Aiming at generality, the paper focuses on the lineage of HRU-style, automaton-based access control models that are fundamental for modeling the dynamic behavior of contemporary role-based or attribute-based access control systems.\u0000 The paper motivates a heuristics-based approach to model analysis, describes in detail a heuristic model safety analysis algorithm, and discusses its computational complexity. The algorithm is the core of a security model analysis tool within the context of a security policy engineering workbench; a formal description of major components of its heuristic-based symbolic model execution engine is given, and its capacity to analyze complex real-world access control systems is evaluated.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"44 1","pages":"137-148"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77210607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A storage-efficient cryptography-based access control solution for subversion 用于subversion的基于存储效率的加密访问控制解决方案
Dominik Leibenger, Christoph Sorge
Version control systems are widely used in software development and document management. Unfortunately, versioning confidential files is not normally supported: Existing solutions encrypt the transport channel, but store data in plaintext within a repository. We come up with an access control solution that allows secure versioning of confidential files even in the presence of a malicious server administrator. Using convergent encryption as a building block, we enable space-efficient storage of version histories despite secure encryption. We describe an implementation of our concept for the Subversion (SVN) system, and evaluate storage efficiency and runtime of this implementation. Our implementation is compatible with existing SVN versions without requiring changes to the storage backend.
版本控制系统广泛应用于软件开发和文档管理。不幸的是,通常不支持对机密文件进行版本控制:现有的解决方案加密传输通道,但在存储库中以明文形式存储数据。我们提出了一种访问控制解决方案,即使在存在恶意服务器管理员的情况下,也可以对机密文件进行安全版本控制。使用聚合加密作为构建块,我们可以在安全加密的情况下实现版本历史记录的空间高效存储。我们描述了Subversion (SVN)系统概念的实现,并评估了该实现的存储效率和运行时间。我们的实现与现有的SVN版本兼容,而不需要更改存储后端。
{"title":"A storage-efficient cryptography-based access control solution for subversion","authors":"Dominik Leibenger, Christoph Sorge","doi":"10.1145/2462410.2462420","DOIUrl":"https://doi.org/10.1145/2462410.2462420","url":null,"abstract":"Version control systems are widely used in software development and document management. Unfortunately, versioning confidential files is not normally supported: Existing solutions encrypt the transport channel, but store data in plaintext within a repository. We come up with an access control solution that allows secure versioning of confidential files even in the presence of a malicious server administrator. Using convergent encryption as a building block, we enable space-efficient storage of version histories despite secure encryption. We describe an implementation of our concept for the Subversion (SVN) system, and evaluate storage efficiency and runtime of this implementation. Our implementation is compatible with existing SVN versions without requiring changes to the storage backend.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"3 1","pages":"201-212"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76089099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ERBAC: event-driven RBAC ERBAC:事件驱动RBAC
P. Bonatti, Clemente Galdi, Davide Torres
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enforcement of general reactive policies. Then we extend XACML to support the new model, and illustrate a prototype implementation of the PDP.
上下文感知访问控制系统应根据动态环境条件,主动调整访问控制决策。在本文中,我们提出了TRBAC模型的扩展,该模型允许规范和执行一般的响应策略。然后对XACML进行扩展以支持新模型,并举例说明了PDP的原型实现。
{"title":"ERBAC: event-driven RBAC","authors":"P. Bonatti, Clemente Galdi, Davide Torres","doi":"10.1145/2462410.2462415","DOIUrl":"https://doi.org/10.1145/2462410.2462415","url":null,"abstract":"Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enforcement of general reactive policies. Then we extend XACML to support the new model, and illustrate a prototype implementation of the PDP.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"11 1","pages":"125-136"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74019779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule 可遵守的隐私承诺:一种应用于HIPAA隐私规则的策略分析方法
Omar Chowdhury, Andreas Gampe, Jianwei Niu, J. Ronne, Jared Bennatt, Anupam Datta, Limin Jia, W. Winsborough
Organizations collect personal information from individuals to carry out their business functions. Federal privacy regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), mandate how this collected information can be shared by the organizations. It is thus incumbent upon the organizations to have means to check compliance with the applicable regulations. Prior work by Barth et. al. introduces two notions of compliance, weak compliance (WC) and strong compliance (SC). WC ensures that present requirements of the policy can be met whereas SC also ensures obligations can be met. An action is compliant with a privacy policy if it is both weakly and strongly compliant. However, their definitions of compliance are restricted to only propositional linear temporal logic (pLTL), which cannot feasibly specify HIPAA. To this end, we present a policy specification language based on a restricted subset of first order temporal logic (FOTL) which can capture the privacy requirements of HIPAA. We then formally specify WC and SC for policies of our form. We prove that checking WC is feasible whereas checking SC is undecidable. We then formally specify the property WC entails SC, denoted by Δ, which requires that each weakly compliant action is also strongly compliant. To check whether an action is compliant with such a policy, it is sufficient to only check whether the action is weakly compliant with that policy. We also prove that when a policy ℘ has the Δ-property, the present requirements of the policy reduce to the safety requirements imposed by ℘. We then develop a sound, semi-automated technique for checking whether practical policies have the Δ-property. We finally use HIPAA as a case study to demonstrate the efficacy of our policy analysis technique.
组织从个人收集个人信息以执行其业务功能。联邦隐私法规,如《健康保险流通与责任法案》(HIPAA),规定了组织如何共享这些收集到的信息。因此,各组织有责任有办法检查对适用条例的遵守情况。Barth等人之前的工作介绍了两个顺从概念,弱顺从(WC)和强顺从(SC)。WC确保目前的政策要求能够得到满足,而SC也确保义务能够得到满足。如果一个操作既弱又强地符合隐私策略,那么它就是符合隐私策略的。然而,他们对遵从性的定义仅限于命题线性时间逻辑(pLTL),这不能可行地指定HIPAA。为此,我们提出了一种基于一阶时间逻辑(FOTL)的受限子集的策略规范语言,该语言可以捕获HIPAA的隐私需求。然后,我们正式地为表单的策略指定WC和SC。我们证明了检验WC是可行的,而检验SC是不可判定的。然后,我们正式指定WC包含SC的属性,用Δ表示,这要求每个弱兼容的动作也是强兼容的。要检查操作是否符合这样的策略,只需检查操作是否弱地符合该策略就足够了。我们还证明了当一个政策p具有Δ-property时,该政策的现有要求降低为p所施加的安全要求。然后,我们开发了一种可靠的、半自动化的技术,用于检查实际策略是否具有Δ-property。最后,我们以HIPAA作为案例研究来证明我们的政策分析技术的有效性。
{"title":"Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule","authors":"Omar Chowdhury, Andreas Gampe, Jianwei Niu, J. Ronne, Jared Bennatt, Anupam Datta, Limin Jia, W. Winsborough","doi":"10.1145/2462410.2462423","DOIUrl":"https://doi.org/10.1145/2462410.2462423","url":null,"abstract":"Organizations collect personal information from individuals to carry out their business functions. Federal privacy regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), mandate how this collected information can be shared by the organizations. It is thus incumbent upon the organizations to have means to check compliance with the applicable regulations. Prior work by Barth et. al. introduces two notions of compliance, weak compliance (WC) and strong compliance (SC). WC ensures that present requirements of the policy can be met whereas SC also ensures obligations can be met. An action is compliant with a privacy policy if it is both weakly and strongly compliant. However, their definitions of compliance are restricted to only propositional linear temporal logic (pLTL), which cannot feasibly specify HIPAA. To this end, we present a policy specification language based on a restricted subset of first order temporal logic (FOTL) which can capture the privacy requirements of HIPAA. We then formally specify WC and SC for policies of our form. We prove that checking WC is feasible whereas checking SC is undecidable. We then formally specify the property WC entails SC, denoted by Δ, which requires that each weakly compliant action is also strongly compliant. To check whether an action is compliant with such a policy, it is sufficient to only check whether the action is weakly compliant with that policy. We also prove that when a policy ℘ has the Δ-property, the present requirements of the policy reduce to the safety requirements imposed by ℘. We then develop a sound, semi-automated technique for checking whether practical policies have the Δ-property. We finally use HIPAA as a case study to demonstrate the efficacy of our policy analysis technique.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"7 1","pages":"3-14"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74059345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
On the notion of redundancy in access control policies 关于访问控制策略中的冗余概念
M. Guarnieri, M. A. Neri, E. Magri, S. Mutti
The evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may increase the total cost of management of the policies and may reduce the performance of access control mechanisms and of other anomaly detection techniques. We consider three approaches that can remove redundancy from access control policies, progressively reducing the number of authorizations in the policy itself. We show that several problems associated with redundancy are NP-hard. We propose exact solutions to two of these problems, namely the Minimum Policy Problem, which consists in computing the minimum policy that represents the behaviour of the system, and the Minimum Irreducible Policy Problem, consisting in computing the redundancy-free version of a policy with the smallest number of authorizations. Furthermore we propose heuristic solutions to those problems. We also present a comparison between the exact and heuristics solutions based on experiments that use policies derived from bibliographical databases.
随着信息系统的发展,越来越需要灵活而复杂的方法来自动检测安全策略中的异常情况。其中一个异常是冗余,它可能增加策略管理的总成本,并可能降低访问控制机制和其他异常检测技术的性能。我们考虑了三种可以从访问控制策略中去除冗余的方法,逐步减少策略本身中的授权数量。我们证明了与冗余相关的几个问题是np困难的。我们提出了其中两个问题的精确解决方案,即最小策略问题,它包括计算代表系统行为的最小策略,以及最小不可约策略问题,包括计算具有最小授权数的策略的无冗余版本。此外,我们对这些问题提出了启发式的解决方案。我们还提出了基于实验的精确和启发式解决方案之间的比较,这些实验使用了来自书目数据库的策略。
{"title":"On the notion of redundancy in access control policies","authors":"M. Guarnieri, M. A. Neri, E. Magri, S. Mutti","doi":"10.1145/2462410.2462426","DOIUrl":"https://doi.org/10.1145/2462410.2462426","url":null,"abstract":"The evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may increase the total cost of management of the policies and may reduce the performance of access control mechanisms and of other anomaly detection techniques. We consider three approaches that can remove redundancy from access control policies, progressively reducing the number of authorizations in the policy itself. We show that several problems associated with redundancy are NP-hard. We propose exact solutions to two of these problems, namely the Minimum Policy Problem, which consists in computing the minimum policy that represents the behaviour of the system, and the Minimum Irreducible Policy Problem, consisting in computing the redundancy-free version of a policy with the smallest number of authorizations. Furthermore we propose heuristic solutions to those problems. We also present a comparison between the exact and heuristics solutions based on experiments that use policies derived from bibliographical databases.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"13 1","pages":"161-172"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88195681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A bigData platform for analytics on access control policies and logs 提供访问控制策略和日志分析的bigData平台
Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken
Relying on an access control security policy alone to protect valuable resources is a dangerous practice. Prudent security must engage in other risk management and mitigation techniques to rapidly detect and recover from breaches. In reality, many security policies are either wrong, containing errors, or are misused and abused by malicious employees or compromised accounts; not all granted access is desirable. A popular approach to mitigate against these and other residual threats is to monitor applications to detect misuse and abuse of credentials in near real-time. We will show a platform for monitoring applications and the use of analytic models on diverse datasets for detecting suspicious user activity. Our platform combines traditional data management systems with BigData platforms to efficiently apply analytics across security relevant data (policies, logs, metadata) and provide administrators a dashboard of the current security status of the organization, and the ability to investigate prioritized alerts. One key analytic in the demo is a novel generalization of the role mining problem as applied to access logs and modeling user behavior for anomalies. Other analytics include conventional statistical measures, Gaussian mixture models and clustering, Markov models, and entropic analysis of requests. This demonstration will walk through a prototype system and describe the analytics and underlying architecture.
仅仅依靠访问控制安全策略来保护有价值的资源是一种危险的做法。谨慎的安全必须采用其他风险管理和缓解技术,以快速发现漏洞并从漏洞中恢复。在现实中,许多安全策略要么是错误的,包含错误,要么被恶意员工或被泄露的帐户误用和滥用;并非所有授予的访问权限都是可取的。减轻这些和其他残余威胁的一种流行方法是监视应用程序,以近乎实时地检测凭证的误用和滥用。我们将展示一个监控应用程序的平台,并在不同的数据集上使用分析模型来检测可疑的用户活动。我们的平台将传统的数据管理系统与BigData平台相结合,有效地对安全相关数据(策略、日志、元数据)进行分析,并为管理员提供组织当前安全状态的仪表板,以及调查优先级警报的能力。演示中的一个关键分析是角色挖掘问题的新泛化,用于访问日志和为异常建模用户行为。其他分析包括传统的统计度量、高斯混合模型和聚类、马尔可夫模型和请求的熵分析。这个演示将介绍一个原型系统,并描述分析和底层架构。
{"title":"A bigData platform for analytics on access control policies and logs","authors":"Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken","doi":"10.1145/2462410.2462433","DOIUrl":"https://doi.org/10.1145/2462410.2462433","url":null,"abstract":"Relying on an access control security policy alone to protect valuable resources is a dangerous practice. Prudent security must engage in other risk management and mitigation techniques to rapidly detect and recover from breaches. In reality, many security policies are either wrong, containing errors, or are misused and abused by malicious employees or compromised accounts; not all granted access is desirable. A popular approach to mitigate against these and other residual threats is to monitor applications to detect misuse and abuse of credentials in near real-time.\u0000 We will show a platform for monitoring applications and the use of analytic models on diverse datasets for detecting suspicious user activity. Our platform combines traditional data management systems with BigData platforms to efficiently apply analytics across security relevant data (policies, logs, metadata) and provide administrators a dashboard of the current security status of the organization, and the ability to investigate prioritized alerts. One key analytic in the demo is a novel generalization of the role mining problem as applied to access logs and modeling user behavior for anomalies. Other analytics include conventional statistical measures, Gaussian mixture models and clustering, Markov models, and entropic analysis of requests. This demonstration will walk through a prototype system and describe the analytics and underlying architecture.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"45 1","pages":"185-188"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84943564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
HyXAC: a hybrid approach for XML access control HyXAC:用于XML访问控制的混合方法
Manogna Thimma, Tsam Kai Tsui, Bo Luo
While XML has been widely adopted for information sharing over the Internet, the need for efficient XML access control naturally arise. Various XML access control enforcement mechanisms have been proposed in the research community, such as view-based approaches and pre-processing approaches. Each category of solutions has its inherent advantages and disadvantages. For instance, view based approach provides high performance in query evaluation, but suffers from the view maintenance issues. To remedy the problems, we propose a hybrid approach, namely HyXAC: Hybrid XML Access Control. HyXAC provides efficient access control and query processing by maximizing the utilization of available (but constrained) resources. HyXAC first uses the pre-processing approach as a baseline to process queries and define sub-views. In HyXAC, views are not defined in a per-role basis, instead, a sub-view is defined for each access control rule, and roles with identical rules would share the sub-view. Moreover, HyXAC dynamically allocates the available resources (memory and secondary storage) to materialize and cache sub-views to improve query performance. With intensive experiments, we have shown that HyXAC optimizes the usage of system resource, and improves the performance of query processing.
虽然XML已被广泛用于Internet上的信息共享,但对有效的XML访问控制的需求自然产生了。在研究界已经提出了各种XML访问控制实施机制,例如基于视图的方法和预处理方法。每种解决方案都有其固有的优点和缺点。例如,基于视图的方法在查询评估方面提供了高性能,但存在视图维护问题。为了解决这些问题,我们提出了一种混合方法,即HyXAC:混合XML访问控制。HyXAC通过最大限度地利用可用(但受限)资源来提供高效的访问控制和查询处理。HyXAC首先使用预处理方法作为基线来处理查询和定义子视图。在HyXAC中,视图不是按角色定义的,而是为每个访问控制规则定义子视图,具有相同规则的角色将共享子视图。此外,HyXAC动态地分配可用资源(内存和二级存储)来实现和缓存子视图,以提高查询性能。通过大量的实验表明,HyXAC优化了系统资源的使用,提高了查询处理的性能。
{"title":"HyXAC: a hybrid approach for XML access control","authors":"Manogna Thimma, Tsam Kai Tsui, Bo Luo","doi":"10.1145/2462410.2462424","DOIUrl":"https://doi.org/10.1145/2462410.2462424","url":null,"abstract":"While XML has been widely adopted for information sharing over the Internet, the need for efficient XML access control naturally arise. Various XML access control enforcement mechanisms have been proposed in the research community, such as view-based approaches and pre-processing approaches. Each category of solutions has its inherent advantages and disadvantages. For instance, view based approach provides high performance in query evaluation, but suffers from the view maintenance issues. To remedy the problems, we propose a hybrid approach, namely HyXAC: Hybrid XML Access Control. HyXAC provides efficient access control and query processing by maximizing the utilization of available (but constrained) resources. HyXAC first uses the pre-processing approach as a baseline to process queries and define sub-views. In HyXAC, views are not defined in a per-role basis, instead, a sub-view is defined for each access control rule, and roles with identical rules would share the sub-view. Moreover, HyXAC dynamically allocates the available resources (memory and secondary storage) to materialize and cache sub-views to improve query performance. With intensive experiments, we have shown that HyXAC optimizes the usage of system resource, and improves the performance of query processing.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"249 1","pages":"113-124"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80679209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Evolving role definitions through permission invocation patterns 通过权限调用模式发展角色定义
Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, B. Malin
In role-based access control (RBAC), roles are traditionally defined as sets of permissions. Roles specified by administrators may be inaccurate, however, such that data mining methods have been proposed to learn roles from actual permission utilization. These methods minimize variation from an information theoretic perspective, but they neglect the expert knowledge of administrators. In this paper, we propose a strategy to enable a controlled evolution of RBAC based on utilization. To accomplish this goal, we extend a subset enumeration framework to search candidate roles for an RBAC model that addresses an objective function which balances administrator beliefs and permission utilization. The rate of role evolution is controlled by an administrator-specified parameter. To assess effectiveness, we perform an empirical analysis using simulations, as well as a real world dataset from an electronic medical record system (EMR) in use at a large academic medical center (over 8000 users, 140 roles, and 140 permissions). We compare the results with several state-of-the-art role mining algorithms using 1) an outlier detection method on the new roles to evaluate the homogeneity of their behavior and 2)a set-based similarity measure between the original and new roles. The results illustrate our method is comparable to the state-of-the-art, but allows for a range of RBAC models which tradeoff user behavior and administrator expectations. For instance, in the EMR dataset, we find the resulting RBAC model contains 22% outliers and a distance of 0.02 to the original RBAC model when the system is biased toward administrator belief, and 13% outliers and a distance of 0.26 to the original RBAC model when biased toward permission utilization.
在基于角色的访问控制(RBAC)中,角色传统上被定义为权限集。然而,管理员指定的角色可能是不准确的,因此已经提出了数据挖掘方法来从实际的权限使用中学习角色。这些方法从信息论的角度最大限度地减少了变化,但它们忽视了管理员的专业知识。在本文中,我们提出了一种基于利用率的RBAC控制进化策略。为了实现这一目标,我们扩展了一个子集枚举框架,以搜索RBAC模型的候选角色,该模型解决了平衡管理员信念和权限使用的目标函数。角色演化的速率由管理员指定的参数控制。为了评估有效性,我们使用模拟和来自大型学术医疗中心(超过8000个用户、140个角色和140个权限)使用的电子病历系统(EMR)的真实世界数据集进行了实证分析。我们将结果与几种最先进的角色挖掘算法进行比较,使用1)新角色的离群值检测方法来评估其行为的同质性;2)原始角色和新角色之间基于集的相似性度量。结果表明,我们的方法与最先进的方法相当,但允许使用一系列RBAC模型来权衡用户行为和管理员期望。例如,在EMR数据集中,我们发现当系统偏向于管理员信念时,得到的RBAC模型包含22%的异常值,与原始RBAC模型的距离为0.02;当系统偏向于权限利用率时,得到的RBAC模型包含13%的异常值,与原始RBAC模型的距离为0.26。
{"title":"Evolving role definitions through permission invocation patterns","authors":"Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, B. Malin","doi":"10.1145/2462410.2462422","DOIUrl":"https://doi.org/10.1145/2462410.2462422","url":null,"abstract":"In role-based access control (RBAC), roles are traditionally defined as sets of permissions. Roles specified by administrators may be inaccurate, however, such that data mining methods have been proposed to learn roles from actual permission utilization. These methods minimize variation from an information theoretic perspective, but they neglect the expert knowledge of administrators. In this paper, we propose a strategy to enable a controlled evolution of RBAC based on utilization. To accomplish this goal, we extend a subset enumeration framework to search candidate roles for an RBAC model that addresses an objective function which balances administrator beliefs and permission utilization. The rate of role evolution is controlled by an administrator-specified parameter. To assess effectiveness, we perform an empirical analysis using simulations, as well as a real world dataset from an electronic medical record system (EMR) in use at a large academic medical center (over 8000 users, 140 roles, and 140 permissions). We compare the results with several state-of-the-art role mining algorithms using 1) an outlier detection method on the new roles to evaluate the homogeneity of their behavior and 2)a set-based similarity measure between the original and new roles. The results illustrate our method is comparable to the state-of-the-art, but allows for a range of RBAC models which tradeoff user behavior and administrator expectations. For instance, in the EMR dataset, we find the resulting RBAC model contains 22% outliers and a distance of 0.02 to the original RBAC model when the system is biased toward administrator belief, and 13% outliers and a distance of 0.26 to the original RBAC model when biased toward permission utilization.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"44 1","pages":"37-48"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84130101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1