首页 > 最新文献

Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Secure benchmarking in the cloud 在云中进行安全基准测试
Axel Schröpfer, A. Schaad, F. Kerschbaum, H. Boehm, Joerg Jooss
Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business process. Privacy by means of controlling access to data is of the utmost importance in benchmarking. Companies are reluctant to share their business performance data due to the risk of losing a competitive advantage or being embarrassed. We present a cryptographic protocol for securely computing benchmarks between multiple parties and describe the technical aspects of a proof of concept implementation of SAP's research prototype Global Benchmarking Service (GBS) on Microsoft's cloud technology Windows Azure.
标杆管理是将一家公司的关键绩效指标(KPI)与其同行集团相同KPI的统计数据进行比较。KPI是衡量业务流程性能的统计量。通过控制对数据的访问来实现隐私在基准测试中是最重要的。由于担心失去竞争优势或陷入尴尬境地,企业不愿分享业绩数据。我们提出了一个用于多方之间安全计算基准的加密协议,并描述了SAP研究原型全球基准测试服务(GBS)在微软云技术Windows Azure上的概念验证实现的技术方面。
{"title":"Secure benchmarking in the cloud","authors":"Axel Schröpfer, A. Schaad, F. Kerschbaum, H. Boehm, Joerg Jooss","doi":"10.1145/2462410.2462430","DOIUrl":"https://doi.org/10.1145/2462410.2462430","url":null,"abstract":"Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business process. Privacy by means of controlling access to data is of the utmost importance in benchmarking. Companies are reluctant to share their business performance data due to the risk of losing a competitive advantage or being embarrassed. We present a cryptographic protocol for securely computing benchmarks between multiple parties and describe the technical aspects of a proof of concept implementation of SAP's research prototype Global Benchmarking Service (GBS) on Microsoft's cloud technology Windows Azure.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"16 1","pages":"197-200"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77406799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A versatile access control implementation: secure box 一个通用的访问控制实现:安全盒子
B. Botelho, D. Pelluzi, E. Nakamura
In this demonstration paper, we describe the implementation of a versatile access control prototype based on multimodal biometrics and graphical passwords that had been designed and developed aligned with the current mobile, multichannel, multiservice, and usability demanding world. The BYOD scenario had also been considered to address the challenges related to protect both corporate and personal information that exist in mobile devices with no more boundaries.
在这篇演示论文中,我们描述了一个基于多模态生物识别和图形密码的多功能访问控制原型的实现,该原型是根据当前移动、多通道、多服务和可用性要求高的世界而设计和开发的。BYOD方案还被考虑用于解决与保护公司和个人信息相关的挑战,这些信息存在于没有更多边界的移动设备中。
{"title":"A versatile access control implementation: secure box","authors":"B. Botelho, D. Pelluzi, E. Nakamura","doi":"10.1145/2462410.2463208","DOIUrl":"https://doi.org/10.1145/2462410.2463208","url":null,"abstract":"In this demonstration paper, we describe the implementation of a versatile access control prototype based on multimodal biometrics and graphical passwords that had been designed and developed aligned with the current mobile, multichannel, multiservice, and usability demanding world. The BYOD scenario had also been considered to address the challenges related to protect both corporate and personal information that exist in mobile devices with no more boundaries.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"33 1","pages":"249-252"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74696130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Panel on granularity in access control 访问控制中的粒度面板
Ian Molloy, Mahesh V. Tripunitara, V. Lotz, M. Kuhlmann, C. Schaufler, V. Atluri
This panel will address the following question. Does an increase in the granularity of access control systems produce a measurable reduction in risk and help meet the goals of the organization, or is the cost prohibitively high? After decades of access control research, products, and practice, there has been a trend towards more complex access control policies and models that more finely restrict (or allow) access to resources. This allows policy administrators to more closely specify any high level abstract policy they may have in mind, or accurately enforce regulations such as HIPPA, SOX, or PCI. The end goal is to allow only those actions that are desirable in hindsight, or via an approach to which Bishop et al. refer as the Oracle Policy. As the expressive power of access control models can vary, an administrator may need a more powerful model to specify the high level policy they need for their particular application. It is not uncommon for new models to add new key-attributes, data-sources, features, or relations to provide a richer set of tools. This has resulted in an explosion of new one-off models in the literature, few of which make their way to real products or deployment. To increase the expressive power of a model, increase its granularity, reduce the complexity of administration and to answer desirable security queries such as safety, a plethora of new concepts have been added to access control models. To name a few: groups and roles; hierarchies and constraints; parameterized permissions; exceptions; time and location of users and resources; relationships between subjects; attributes of subjects, objects, and actions; information flow; conflict of interest classes; obligations; trust, benefit, and risk; workflows; delegation; situational awareness and context; and so on. All of these constructs build to a meta-model, as Barker observes. This granularity has resulted in many novel and useful findings, new algorithms, and challenging open research issues, but poses potential problems as well. With granularity often comes complexity which manifests itself in specifying policies, managing and maintaining policies over time, and auditing logs to ensure compliance. This panel will discuss issues surrounding the problem of complexity in access control. From designing and specifying new models, designing enforcement mechanisms on real-world systems, policy lifecycle, and the role of analytics from automatically generating policies to auditing logs. So, is this complexity worth it? Does increasing the granularity produce a measurable reduction in the risk to sensitive resources and protect the goals of the organization or is the cost prohibitively high? Can we ever truly specify a "correct" and "complete" policy, which may be too dynamic and require the interpretation of the courts to decide, especially when policies are intended to enforce ambiguous regulations. Finally, at what cost should we strive for a perfect, fine-grained pol
这个小组将讨论以下问题。访问控制系统粒度的增加是否会产生可测量的风险降低并帮助实现组织的目标,或者成本是否过高?经过几十年的访问控制研究、产品和实践,已经出现了更复杂的访问控制策略和模型的趋势,这些策略和模型可以更精细地限制(或允许)对资源的访问。这允许策略管理员更紧密地指定他们可能想到的任何高级抽象策略,或者准确地执行诸如HIPPA、SOX或PCI之类的法规。最终目标是只允许那些事后想要的操作,或者通过Bishop等人称为Oracle Policy的方法。由于访问控制模型的表达能力各不相同,管理员可能需要更强大的模型来指定特定应用程序所需的高级策略。对于新模型来说,添加新的键属性、数据源、特性或关系以提供更丰富的工具集是很常见的。这导致了文献中新的一次性模型的爆炸式增长,其中很少有能够用于实际产品或部署。为了增强模型的表达能力、增加模型的粒度、降低管理的复杂性以及回答所需的安全性查询(如安全性),访问控制模型中添加了大量的新概念。举几个例子:群体和角色;层次结构和约束;参数化的权限;异常;用户和资源的时间和地点;主体之间的关系;主体、客体和动作的属性;信息流动;利益冲突阶层;义务;信任、利益和风险;工作流;代表团;态势感知和情境;等等......正如Barker所观察到的那样,所有这些构造都构建成一个元模型。这种粒度导致了许多新颖和有用的发现、新算法和具有挑战性的开放研究问题,但也带来了潜在的问题。粒度通常会带来复杂性,这体现在指定策略、管理和维护策略以及审计日志以确保遵从性方面。这个小组将讨论访问控制的复杂性问题。从设计和指定新模型,设计实际系统上的执行机制,策略生命周期,以及分析的角色,从自动生成策略到审计日志。那么,这种复杂性值得吗?增加粒度是否会降低敏感资源的风险并保护组织的目标,还是成本过高?我们能否真正指定一个“正确”和“完整”的政策,这可能过于动态,需要法院的解释来决定,特别是当政策旨在执行模棱两可的法规时。最后,我们应该以什么样的代价来争取一个完美的、细粒度的政策?是否应该将更多的资源用于从安全漏洞中恢复而不是预防?我们应该“让平均修复时间等于零,而不是让平均故障间隔时间等于无限”吗?
{"title":"Panel on granularity in access control","authors":"Ian Molloy, Mahesh V. Tripunitara, V. Lotz, M. Kuhlmann, C. Schaufler, V. Atluri","doi":"10.1145/2462410.2462889","DOIUrl":"https://doi.org/10.1145/2462410.2462889","url":null,"abstract":"This panel will address the following question. Does an increase in the granularity of access control systems produce a measurable reduction in risk and help meet the goals of the organization, or is the cost prohibitively high?\u0000 After decades of access control research, products, and practice, there has been a trend towards more complex access control policies and models that more finely restrict (or allow) access to resources. This allows policy administrators to more closely specify any high level abstract policy they may have in mind, or accurately enforce regulations such as HIPPA, SOX, or PCI. The end goal is to allow only those actions that are desirable in hindsight, or via an approach to which Bishop et al. refer as the Oracle Policy.\u0000 As the expressive power of access control models can vary, an administrator may need a more powerful model to specify the high level policy they need for their particular application. It is not uncommon for new models to add new key-attributes, data-sources, features, or relations to provide a richer set of tools. This has resulted in an explosion of new one-off models in the literature, few of which make their way to real products or deployment.\u0000 To increase the expressive power of a model, increase its granularity, reduce the complexity of administration and to answer desirable security queries such as safety, a plethora of new concepts have been added to access control models. To name a few: groups and roles; hierarchies and constraints; parameterized permissions; exceptions; time and location of users and resources; relationships between subjects; attributes of subjects, objects, and actions; information flow; conflict of interest classes; obligations; trust, benefit, and risk; workflows; delegation; situational awareness and context; and so on.\u0000 All of these constructs build to a meta-model, as Barker observes.\u0000 This granularity has resulted in many novel and useful findings, new algorithms, and challenging open research issues, but poses potential problems as well. With granularity often comes complexity which manifests itself in specifying policies, managing and maintaining policies over time, and auditing logs to ensure compliance.\u0000 This panel will discuss issues surrounding the problem of complexity in access control. From designing and specifying new models, designing enforcement mechanisms on real-world systems, policy lifecycle, and the role of analytics from automatically generating policies to auditing logs. So, is this complexity worth it? Does increasing the granularity produce a measurable reduction in the risk to sensitive resources and protect the goals of the organization or is the cost prohibitively high?\u0000 Can we ever truly specify a \"correct\" and \"complete\" policy, which may be too dynamic and require the interpretation of the courts to decide, especially when policies are intended to enforce ambiguous regulations. Finally, at what cost should we strive for a perfect, fine-grained pol","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"3 1","pages":"85-86"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75161537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks 超越问责制:使用义务来减少风险暴露并阻止内部攻击
N. Baracaldo, J. Joshi
Recently, the importance of including obligations as part of access control systems for privilege management, for example, in healthcare information systems, has been well recognized. In an access control system, an a posteriori obligation states which actions need to be performed by a user after he has accessed a resource. There is no guarantee that a user will fulfill a posteriori obligations. Not fulfilling these obligations may incur financial loss, or loss of goodwill and productivity to the organization. In this paper, we propose a trust-and-obligation based framework that reduces the risk exposure of an organization associated with a posteriori obligations. We propose a methodology to assign trust values to users to indicate how trustworthy they are with regards to fulfilling their obligations. When access requests that trigger a posteriori obligations are evaluated, the requesting users' trust values and the criticality of the associated obligations are used. Our framework detects and mitigates insider attacks and unintentional damages that may result from violating a posteriori obligations. Our framework also provides mechanisms to determine misconfigurations of obligation policies. We evaluate our framework through simulations and demonstrate its effectiveness.
最近,将义务作为权限管理访问控制系统的一部分(例如,在医疗保健信息系统中)的重要性已得到充分认识。在访问控制系统中,事后义务规定了用户在访问资源后需要执行哪些操作。不能保证用户将履行事后义务。不履行这些义务可能会导致财务损失,或对组织的商誉和生产力的损失。在本文中,我们提出了一个基于信任和义务的框架,该框架减少了与后验义务相关的组织的风险暴露。我们提出了一种方法来分配信任值给用户,以表明他们在履行义务方面是多么值得信赖。当评估触发后验义务的访问请求时,将使用请求用户的信任值和相关义务的临界性。我们的框架检测并减轻了内部攻击和可能因违反事后义务而导致的意外损害。我们的框架还提供了确定义务策略错误配置的机制。我们通过仿真来评估我们的框架,并证明了它的有效性。
{"title":"Beyond accountability: using obligations to reduce risk exposure and deter insider attacks","authors":"N. Baracaldo, J. Joshi","doi":"10.1145/2462410.2462411","DOIUrl":"https://doi.org/10.1145/2462410.2462411","url":null,"abstract":"Recently, the importance of including obligations as part of access control systems for privilege management, for example, in healthcare information systems, has been well recognized. In an access control system, an a posteriori obligation states which actions need to be performed by a user after he has accessed a resource. There is no guarantee that a user will fulfill a posteriori obligations. Not fulfilling these obligations may incur financial loss, or loss of goodwill and productivity to the organization. In this paper, we propose a trust-and-obligation based framework that reduces the risk exposure of an organization associated with a posteriori obligations. We propose a methodology to assign trust values to users to indicate how trustworthy they are with regards to fulfilling their obligations. When access requests that trigger a posteriori obligations are evaluated, the requesting users' trust values and the criticality of the associated obligations are used. Our framework detects and mitigates insider attacks and unintentional damages that may result from violating a posteriori obligations. Our framework also provides mechanisms to determine misconfigurations of obligation policies. We evaluate our framework through simulations and demonstrate its effectiveness.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"15 1","pages":"213-224"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78436126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Property-testing real-world authorization systems 属性测试真实世界的授权系统
A. Sharifi, P. Bottinelli, Mahesh V. Tripunitara
We motivate and address the problem of testing for properties of interest in real-world implementations of authorization systems. We adopt a 4-stage process: (1) express a property precisely using existential second-order logic, (2) establish types of traces that are necessary and sufficient to establish a property, (3) adopt finitizing assumptions and show that under those assumptions, verifying a property is in PSPACE, and, (4) use a model-checker as a trace-generator to generate instances of traces, and exercise the implementation to check for those traces. We discuss our design of a corresponding testing-system, and its use to test for qualitatively different kinds of properties in two commercial authorization systems. One is a database system that we call the D system, and the other is a file-sharing system that we call the I system. (We use pseudonyms at the request of the respective vendors.) In the context of the D system, our testing has uncovered several issues with its authorization system in the context of procedures that aggregate SQL statements that, to our knowledge, are new to the research literature. For the I system, we have established that it possesses several properties of interest.
我们鼓励并解决在授权系统的实际实现中测试感兴趣的属性的问题。我们采用了一个四阶段的过程:(1)使用存在二阶逻辑精确地表达一个属性,(2)建立建立属性所必需和充分的轨迹类型,(3)采用终化假设,并表明在这些假设下,验证属性在PSPACE中,(4)使用模型检查器作为轨迹生成器来生成轨迹实例,并执行实现来检查这些轨迹。我们设计了一个相应的测试系统,并在两个商业授权系统中对不同性质的属性进行了测试。一个是数据库系统,我们称之为D系统,另一个是文件共享系统,我们称之为I系统。(应各供应商的要求,我们使用了假名。)在D系统的上下文中,我们的测试发现了它的授权系统在过程的上下文中存在的几个问题,这些过程聚合了SQL语句,据我们所知,这些SQL语句在研究文献中是新的。对于I系统,我们已经确定了它具有几个感兴趣的性质。
{"title":"Property-testing real-world authorization systems","authors":"A. Sharifi, P. Bottinelli, Mahesh V. Tripunitara","doi":"10.1145/2462410.2463207","DOIUrl":"https://doi.org/10.1145/2462410.2463207","url":null,"abstract":"We motivate and address the problem of testing for properties of interest in real-world implementations of authorization systems. We adopt a 4-stage process: (1) express a property precisely using existential second-order logic, (2) establish types of traces that are necessary and sufficient to establish a property, (3) adopt finitizing assumptions and show that under those assumptions, verifying a property is in PSPACE, and, (4) use a model-checker as a trace-generator to generate instances of traces, and exercise the implementation to check for those traces. We discuss our design of a corresponding testing-system, and its use to test for qualitatively different kinds of properties in two commercial authorization systems. One is a database system that we call the D system, and the other is a file-sharing system that we call the I system. (We use pseudonyms at the request of the respective vendors.) In the context of the D system, our testing has uncovered several issues with its authorization system in the context of procedures that aggregate SQL statements that, to our knowledge, are new to the research literature. For the I system, we have established that it possesses several properties of interest.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"90 3 1","pages":"225-236"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76659584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information flow control for stream processing in clouds 云中流处理的信息流控制
Xing Xie, I. Ray, R. Adaikkalavan, R. Gamble
In the near future, clouds will provide situational monitoring services using streaming data. Examples of such services include health monitoring, stock market monitoring, shopping cart monitoring, and emergency control and threat management. Offering such services require securely processing data streams generated by multiple, possibly competing and/or complementing, organizations. Processing of data streams also should not cause any overt or covert leakage of information across organizations. We propose an information flow control model adapted from the Chinese Wall policy that can be used to protect against sensitive data disclosure. We propose architectures that are suitable for securely and efficiently processing streaming information belonging to different organizations. We discuss how performance can be further improved by sharing the processing of multiple queries. We demonstrate the feasibility of our approach by implementing a prototype of our system and show the overhead incurred due to the information flow constraints.
在不久的将来,云将使用流数据提供态势监控服务。此类服务的示例包括健康监控、股票市场监控、购物车监控以及紧急控制和威胁管理。提供此类服务需要安全地处理由多个可能相互竞争和/或互补的组织生成的数据流。数据流的处理也不应导致任何公开或隐蔽的跨组织信息泄漏。我们提出了一个信息流控制模型,该模型改编自中国墙政策,可用于防止敏感数据泄露。我们提出了适合于安全有效地处理属于不同组织的流信息的架构。我们将讨论如何通过共享多个查询的处理来进一步提高性能。我们通过实现系统的原型来演示我们方法的可行性,并显示由于信息流约束而产生的开销。
{"title":"Information flow control for stream processing in clouds","authors":"Xing Xie, I. Ray, R. Adaikkalavan, R. Gamble","doi":"10.1145/2462410.2463205","DOIUrl":"https://doi.org/10.1145/2462410.2463205","url":null,"abstract":"In the near future, clouds will provide situational monitoring services using streaming data. Examples of such services include health monitoring, stock market monitoring, shopping cart monitoring, and emergency control and threat management. Offering such services require securely processing data streams generated by multiple, possibly competing and/or complementing, organizations. Processing of data streams also should not cause any overt or covert leakage of information across organizations. We propose an information flow control model adapted from the Chinese Wall policy that can be used to protect against sensitive data disclosure. We propose architectures that are suitable for securely and efficiently processing streaming information belonging to different organizations. We discuss how performance can be further improved by sharing the processing of multiple queries. We demonstrate the feasibility of our approach by implementing a prototype of our system and show the overhead incurred due to the information flow constraints.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"56 1","pages":"89-100"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83354376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An actor-based, application-aware access control evaluation framework 基于参与者的、应用程序感知的访问控制评估框架
W. C. Garrison, Adam J. Lee, Timothy L. Hinrichs
To date, most work regarding the formal analysis of access control schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property that exists in an *absolute* sense, detached from the application context within which an access control scheme will ultimately be deployed. By contrast, we formalize the access control *suitability analysis problem*, which seeks to evaluate the degree to which a set of candidate access control schemes can meet the needs of an application-specific workload. This process involves both reductions to assess whether a scheme is *capable* of implementing a workload (qualitative analysis), as well as cost analysis using ordered measures to quantify the *overheads* of using each candidate scheme to service the workload (quantitative analysis). We formalize the two-facet suitability analysis problem, which formally describes this task. We then develop a mathematical framework for this type of analysis, and evaluate this framework both formally, by quantifying its efficiency and accuracy properties, and practically, by exploring an academic program committee workload.
迄今为止,关于访问控制方案的形式化分析的大多数工作都集中在量化和比较一组方案的表达能力上。虽然表达能力很重要,但它是一种“绝对”存在的属性,与最终部署访问控制方案的应用程序上下文分离。相比之下,我们形式化了访问控制*适用性分析问题*,该问题旨在评估一组候选访问控制方案能够满足特定应用程序工作负载需求的程度。这一过程包括两方面的削减,以评估一个方案是否“能够”实现工作量(定性分析),以及使用有序的措施进行成本分析,以量化使用每个候选方案来服务工作量的“间接费用”(定量分析)。我们形式化了两方面的适用性分析问题,它形式化地描述了这个任务。然后,我们为这种类型的分析开发了一个数学框架,并通过量化其效率和准确性属性,以及通过探索学术项目委员会的工作量,正式地评估这个框架。
{"title":"An actor-based, application-aware access control evaluation framework","authors":"W. C. Garrison, Adam J. Lee, Timothy L. Hinrichs","doi":"10.1145/2613087.2613099","DOIUrl":"https://doi.org/10.1145/2613087.2613099","url":null,"abstract":"To date, most work regarding the formal analysis of access control schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property that exists in an *absolute* sense, detached from the application context within which an access control scheme will ultimately be deployed. By contrast, we formalize the access control *suitability analysis problem*, which seeks to evaluate the degree to which a set of candidate access control schemes can meet the needs of an application-specific workload. This process involves both reductions to assess whether a scheme is *capable* of implementing a workload (qualitative analysis), as well as cost analysis using ordered measures to quantify the *overheads* of using each candidate scheme to service the workload (quantitative analysis). We formalize the two-facet suitability analysis problem, which formally describes this task. We then develop a mathematical framework for this type of analysis, and evaluate this framework both formally, by quantifying its efficiency and accuracy properties, and practically, by exploring an academic program committee workload.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"481 1","pages":"199-210"},"PeriodicalIF":0.0,"publicationDate":"2013-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79960527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Constraint expressions and workflow satisfiability 约束表达式和工作流的可满足性
J. Crampton, G. Gutin
A workflow specification defines a set of steps and the order in which those steps must be executed. Security requirements and business rules may impose constraints on which users are permitted to perform those steps. A workflow specification is said to be satisfiable if there exists an assignment of authorized users to workflow steps that satisfies all the constraints. An algorithm for determining whether such an assignment exists is important, both as a static analysis tool for workflow specifications, and for the construction of run-time reference monitors for workflow management systems. We develop new methods for determining workflow satisfiability based on the concept of constraint expressions, which were introduced recently by Khan and Fong. These methods are surprising versatile, enabling us to develop algorithms for, and determine the complexity of, a number of different problems related to workflow satisfiability.
工作流规范定义了一组步骤以及必须执行这些步骤的顺序。安全需求和业务规则可能会对允许哪些用户执行这些步骤施加约束。如果存在授权用户对满足所有约束的工作流步骤的分配,则称工作流规范是可满足的。确定这种分配是否存在的算法是重要的,它既是工作流规范的静态分析工具,也是工作流管理系统的运行时参考监视器的构造。基于Khan和Fong最近提出的约束表达式的概念,我们开发了确定工作流满意度的新方法。这些方法具有惊人的通用性,使我们能够为与工作流满意度相关的许多不同问题开发算法并确定其复杂性。
{"title":"Constraint expressions and workflow satisfiability","authors":"J. Crampton, G. Gutin","doi":"10.1145/2462410.2462419","DOIUrl":"https://doi.org/10.1145/2462410.2462419","url":null,"abstract":"A workflow specification defines a set of steps and the order in which those steps must be executed. Security requirements and business rules may impose constraints on which users are permitted to perform those steps. A workflow specification is said to be satisfiable if there exists an assignment of authorized users to workflow steps that satisfies all the constraints. An algorithm for determining whether such an assignment exists is important, both as a static analysis tool for workflow specifications, and for the construction of run-time reference monitors for workflow management systems. We develop new methods for determining workflow satisfiability based on the concept of constraint expressions, which were introduced recently by Khan and Fong. These methods are surprising versatile, enabling us to develop algorithms for, and determine the complexity of, a number of different problems related to workflow satisfiability.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"28 1","pages":"73-84"},"PeriodicalIF":0.0,"publicationDate":"2013-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82211453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Towards a policy enforcement infrastructure for distributed usage control 实现分布式使用控制的策略实施基础设施
Florian Kelbert, A. Pretschner
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an application- and application-protocol-independent infrastructure that allows for the enforcement of usage control policies in a distributed environment. We instantiate the infrastructure for transferring files using FTP and for a scenario where smart meters are connected to a Facebook application.
分布式使用控制关注的是数据在被授予初始访问权后如何使用或不使用,因此在分布式系统环境中尤为重要。我们提出了一个独立于应用程序和应用程序协议的基础设施,允许在分布式环境中实施使用控制策略。我们实例化了使用FTP传输文件的基础设施,以及智能电表连接到Facebook应用程序的场景。
{"title":"Towards a policy enforcement infrastructure for distributed usage control","authors":"Florian Kelbert, A. Pretschner","doi":"10.1145/2295136.2295159","DOIUrl":"https://doi.org/10.1145/2295136.2295159","url":null,"abstract":"Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an application- and application-protocol-independent infrastructure that allows for the enforcement of usage control policies in a distributed environment. We instantiate the infrastructure for transferring files using FTP and for a scenario where smart meters are connected to a Facebook application.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"409 1","pages":"119-122"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80208163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Graph-based XACML evaluation 基于图的XACML计算
Santiago Pina Ros, Mario Lischka, Félix Gómez Mármol
The amount of private information in the Internet is constantly increasing with the explosive growth of cloud computing and social networks. XACML is one of the most important standards for specifying access control policies for web services. The number of XACML policies grows really fast and evaluation processing time becomes longer. The XEngine approach proposes to rearrange the matching tree according to the attributes used in the target sections, but for speed reasons they only support equality of attribute values. For a fast termination the combining algorithms are transformed into a first applicable policy, which does not support obligations correctly. In our approach all comparison functions defined in XACML as well as obligations are supported. In this paper we propose an optimization for XACML policies evaluation based on two tree structures. The first one, called Matching Tree, is created for a fast searching of applicable rules. The second one, called Combining Tree, is used for the evaluation of the applicable rules. Finally, we propose an exploring method for the Matching Tree based on the binary search algorithm. The experimental results show that our approach is orders of magnitude better than Sun PDP.
随着云计算和社交网络的爆炸式增长,互联网上的私人信息数量不断增加。XACML是为web服务指定访问控制策略的最重要标准之一。XACML策略的数量增长非常快,评估处理时间变得更长。XEngine方法建议根据目标部分中使用的属性重新排列匹配树,但出于速度原因,它们只支持属性值相等。为了快速终止,将组合算法转换为第一适用策略,该策略不正确地支持义务。在我们的方法中,支持XACML中定义的所有比较函数以及义务。本文提出了一种基于两树结构的XACML策略评估优化方法。第一个称为匹配树(Matching Tree),是为快速搜索适用规则而创建的。第二个称为组合树,用于评估适用的规则。最后,提出了一种基于二叉搜索算法的匹配树探索方法。实验结果表明,我们的方法比Sun PDP算法好几个数量级。
{"title":"Graph-based XACML evaluation","authors":"Santiago Pina Ros, Mario Lischka, Félix Gómez Mármol","doi":"10.1145/2295136.2295153","DOIUrl":"https://doi.org/10.1145/2295136.2295153","url":null,"abstract":"The amount of private information in the Internet is constantly increasing with the explosive growth of cloud computing and social networks. XACML is one of the most important standards for specifying access control policies for web services. The number of XACML policies grows really fast and evaluation processing time becomes longer. The XEngine approach proposes to rearrange the matching tree according to the attributes used in the target sections, but for speed reasons they only support equality of attribute values. For a fast termination the combining algorithms are transformed into a first applicable policy, which does not support obligations correctly.\u0000 In our approach all comparison functions defined in XACML as well as obligations are supported. In this paper we propose an optimization for XACML policies evaluation based on two tree structures. The first one, called Matching Tree, is created for a fast searching of applicable rules. The second one, called Combining Tree, is used for the evaluation of the applicable rules. Finally, we propose an exploring method for the Matching Tree based on the binary search algorithm. The experimental results show that our approach is orders of magnitude better than Sun PDP.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"5 1","pages":"83-92"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77781225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
期刊
Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1