首页 > 最新文献

Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Hardware-enhanced access control for cloud computing 用于云计算的硬件增强访问控制
R. Lee
Future trustworthy computer systems should provide built-in support for at least the cornerstone security properties of confidentiality, integrity and availability. Access control can help significantly towards achieving this. However, in today's computing landscape, traditional access control implemented only in software may be either insufficient or non-optimal. We discuss some of these situations. Furthermore, fine-grained access control and usage control mechanisms implemented in software are themselves subject to attack, and may impose heavy performance overheads. Can new hardware architecture improve the security achievable by software mechanisms for access control and usage control? If so, what types of hardware support are most useful while retaining the flexibility of software protection mechanisms? What can software do, to help hardware achieve the best results? With the trend towards Cloud Computing, we discuss how new hardware architectural features for cloud servers can help protect the confidentiality and integrity of a cloud customer's code and data in his leased Virtual Machines -- even when the powerful underlying hypervisor may be compromised. This uses a new, non-bypassable form of hardware access control. Without requiring new hardware, we can also leverage the hardware trend towards manycore chips, and the already available hardware virtualization features, to enhance Cloud Security -- but with a few restrictions and some new software support. In general, we would like to motivate collaborations between the software security and the hardware architecture communities to explore software-hardware co-design for security. What comes beyond access control in cloud computing and mobile computing ecosystems? The goal is to design future trustworthy systems that provide security protections, at the levels needed, when needed, even with malware in the system.
未来值得信赖的计算机系统应该至少为机密性、完整性和可用性等基础安全属性提供内置支持。访问控制可以极大地帮助实现这一目标。然而,在当今的计算环境中,仅在软件中实现的传统访问控制可能是不够的或非最佳的。我们将讨论其中的一些情况。此外,在软件中实现的细粒度访问控制和使用控制机制本身也容易受到攻击,并可能带来沉重的性能开销。新的硬件架构能否提高访问控制和使用控制的软件机制所能达到的安全性?如果是这样,在保留软件保护机制的灵活性的同时,哪种类型的硬件支持最有用?软件能做些什么来帮助硬件达到最佳效果?随着云计算的趋势,我们将讨论云服务器的新硬件架构特性如何帮助保护云客户租用的虚拟机中代码和数据的机密性和完整性——即使强大的底层管理程序可能受到损害。这使用了一种新的、不可绕过的硬件访问控制形式。在不需要新硬件的情况下,我们还可以利用多核芯片的硬件趋势,以及已经可用的硬件虚拟化功能,来增强云安全——但需要一些限制和一些新的软件支持。一般来说,我们希望鼓励软件安全性和硬件架构社区之间的协作,以探索安全性的软硬件协同设计。在云计算和移动计算生态系统中,除了访问控制之外还有什么?目标是设计未来可信赖的系统,在需要时提供所需级别的安全保护,即使系统中存在恶意软件。
{"title":"Hardware-enhanced access control for cloud computing","authors":"R. Lee","doi":"10.1145/2295136.2295138","DOIUrl":"https://doi.org/10.1145/2295136.2295138","url":null,"abstract":"Future trustworthy computer systems should provide built-in support for at least the cornerstone security properties of confidentiality, integrity and availability. Access control can help significantly towards achieving this. However, in today's computing landscape, traditional access control implemented only in software may be either insufficient or non-optimal. We discuss some of these situations. Furthermore, fine-grained access control and usage control mechanisms implemented in software are themselves subject to attack, and may impose heavy performance overheads. Can new hardware architecture improve the security achievable by software mechanisms for access control and usage control? If so, what types of hardware support are most useful while retaining the flexibility of software protection mechanisms? What can software do, to help hardware achieve the best results?\u0000 With the trend towards Cloud Computing, we discuss how new hardware architectural features for cloud servers can help protect the confidentiality and integrity of a cloud customer's code and data in his leased Virtual Machines -- even when the powerful underlying hypervisor may be compromised. This uses a new, non-bypassable form of hardware access control. Without requiring new hardware, we can also leverage the hardware trend towards manycore chips, and the already available hardware virtualization features, to enhance Cloud Security -- but with a few restrictions and some new software support.\u0000 In general, we would like to motivate collaborations between the software security and the hardware architecture communities to explore software-hardware co-design for security. What comes beyond access control in cloud computing and mobile computing ecosystems? The goal is to design future trustworthy systems that provide security protections, at the levels needed, when needed, even with malware in the system.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"15 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81603150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A trust-and-risk aware RBAC framework: tackling insider threat 具有信任和风险意识的RBAC框架:解决内部威胁
N. Baracaldo, J. Joshi
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack occurs when a person authorized to perform certain actions in an organization decides to abuse the trust, and harm the organization. These attacks may negatively impact the reputation of the organization, its productivity, and may produce losses in revenue and clients. Avoiding insider attacks is a daunting task. While it is necessary to provide privileges to employees so they can perform their jobs efficiently, providing too many privileges may backfire when users accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. In this paper, we propose a framework that extends the role-based access control (RBAC) model by incorporating a risk assessment process, and the trust the system has on its users. Our framework adapts to suspicious changes in users' behavior by removing privileges when users' trust falls below a certain threshold. This threshold is computed based on a risk assessment process that includes the risk due to inference of unauthorized information. We use a Coloured-Petri net to detect inferences. We also redefine the existing role activation problem, and propose an algorithm that reduces the risk exposure. We present experimental evaluation to validate our work.
内部攻击是当今组织面临的最危险的威胁之一。当被授权在组织中执行某些操作的人决定滥用信任并损害组织时,就会发生内部攻击。这些攻击可能会对组织的声誉、生产力产生负面影响,并可能导致收入和客户的损失。避免内部攻击是一项艰巨的任务。虽然为员工提供特权是必要的,这样他们就可以有效地执行工作,但是当用户意外或故意滥用特权时,提供太多的特权可能会适得其反。因此,有必要找到一个中间地带,既提供必要的特权,又避免恶意使用。在本文中,我们提出了一个框架,扩展了基于角色的访问控制(RBAC)模型,通过纳入风险评估过程,以及系统对其用户的信任。我们的框架通过在用户信任低于一定阈值时删除特权来适应用户行为的可疑变化。该阈值是基于风险评估流程计算的,该流程包括由于未经授权的信息推断而导致的风险。我们使用彩色petri网来检测推断。我们还重新定义了现有的角色激活问题,并提出了一种降低风险暴露的算法。我们提出了实验评估来验证我们的工作。
{"title":"A trust-and-risk aware RBAC framework: tackling insider threat","authors":"N. Baracaldo, J. Joshi","doi":"10.1145/2295136.2295168","DOIUrl":"https://doi.org/10.1145/2295136.2295168","url":null,"abstract":"Insider Attacks are one of the most dangerous threats organizations face today. An insider attack occurs when a person authorized to perform certain actions in an organization decides to abuse the trust, and harm the organization. These attacks may negatively impact the reputation of the organization, its productivity, and may produce losses in revenue and clients. Avoiding insider attacks is a daunting task. While it is necessary to provide privileges to employees so they can perform their jobs efficiently, providing too many privileges may backfire when users accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. In this paper, we propose a framework that extends the role-based access control (RBAC) model by incorporating a risk assessment process, and the trust the system has on its users. Our framework adapts to suspicious changes in users' behavior by removing privileges when users' trust falls below a certain threshold. This threshold is computed based on a risk assessment process that includes the risk due to inference of unauthorized information. We use a Coloured-Petri net to detect inferences. We also redefine the existing role activation problem, and propose an algorithm that reduces the risk exposure. We present experimental evaluation to validate our work.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"5 1","pages":"167-176"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81899942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A framework integrating attribute-based policies into role-based access control 将基于属性的策略集成到基于角色的访问控制中的框架
Jingwei Huang, D. Nicol, R. Bobba, J. Huh
Integrated role-based access control (RBAC) and attribute-based access control (ABAC) is emerging as a promising paradigm. This paper proposes a framework that uses attribute-based policies to create a more traditional RBAC model. RBAC has been widely used, but has weaknesses: it is labor-intensive and time-consuming to build a model instance, and a pure RBAC system lacks flexibility to efficiently adapt to changing users, objects, and security policies. Particularly, it is impractical to manually make (and maintain) user to role assignments and role to permission assignments in industrial context characterized by a large number of users and/or security objects. ABAC has features complimentary to RBAC, and merging RBAC and ABAC has become an important research topic. This paper proposes a new approach to integrating ABAC with RBAC, by modeling RBAC in two levels. The aboveground level is a standard RBAC model extended with "environment". This level retains the simplicity of RBAC, supporting RBAC model verification/review. The "underground" level is used to represent security knowledge in terms of attribute-based policies, which automatically create the simple RBAC model in the aboveground level. These attribute-based policies bring to RBAC the advantages of ABAC: they are easy to build and easy to adapt to changes. Using this framework, we tackle the problem of permission assignment for large scale applications. This model is motivated by the characteristics and requirements of industrial control systems, and reflects in part certain approaches and practices common in the industry.
基于角色的集成访问控制(RBAC)和基于属性的集成访问控制(ABAC)是一种很有前途的模式。本文提出了一个使用基于属性的策略来创建更传统的RBAC模型的框架。RBAC已经得到了广泛的应用,但是它也有缺点:构建模型实例需要大量的劳动和时间,而且纯RBAC系统缺乏灵活性,无法有效地适应不断变化的用户、对象和安全策略。特别是,在以大量用户和/或安全对象为特征的工业上下文中,手动进行(和维护)用户到角色分配和角色到权限分配是不切实际的。ABAC具有与RBAC互补的特性,RBAC与ABAC的融合已成为重要的研究课题。本文提出了一种集成ABAC和RBAC的新方法,将RBAC分为两个层次进行建模。地上层是一个扩展了“环境”的标准RBAC模型。该级别保留了RBAC的简单性,支持RBAC模型验证/审查。“地下”层用于根据基于属性的策略表示安全知识,该策略自动创建地上层的简单RBAC模型。这些基于属性的策略为RBAC带来了ABAC的优势:它们易于构建并且易于适应变化。使用这个框架,我们解决了大规模应用程序的权限分配问题。该模型是由工业控制系统的特点和要求驱动的,部分反映了工业中常见的某些方法和实践。
{"title":"A framework integrating attribute-based policies into role-based access control","authors":"Jingwei Huang, D. Nicol, R. Bobba, J. Huh","doi":"10.1145/2295136.2295170","DOIUrl":"https://doi.org/10.1145/2295136.2295170","url":null,"abstract":"Integrated role-based access control (RBAC) and attribute-based access control (ABAC) is emerging as a promising paradigm. This paper proposes a framework that uses attribute-based policies to create a more traditional RBAC model. RBAC has been widely used, but has weaknesses: it is labor-intensive and time-consuming to build a model instance, and a pure RBAC system lacks flexibility to efficiently adapt to changing users, objects, and security policies. Particularly, it is impractical to manually make (and maintain) user to role assignments and role to permission assignments in industrial context characterized by a large number of users and/or security objects. ABAC has features complimentary to RBAC, and merging RBAC and ABAC has become an important research topic. This paper proposes a new approach to integrating ABAC with RBAC, by modeling RBAC in two levels. The aboveground level is a standard RBAC model extended with \"environment\". This level retains the simplicity of RBAC, supporting RBAC model verification/review. The \"underground\" level is used to represent security knowledge in terms of attribute-based policies, which automatically create the simple RBAC model in the aboveground level. These attribute-based policies bring to RBAC the advantages of ABAC: they are easy to build and easy to adapt to changes. Using this framework, we tackle the problem of permission assignment for large scale applications. This model is motivated by the characteristics and requirements of industrial control systems, and reflects in part certain approaches and practices common in the industry.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"2 1","pages":"187-196"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79437184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
The authorization leap from rights to attributes: maturation or chaos? 授权从权利到属性的飞跃:成熟还是混乱?
R. Sandhu
The ongoing authorization leap from rights to attributes offers numerous compelling benefits. Decisions about user, subject, object and context attributes can be made relatively independently and with suitable decentralization appropriate for each attribute. Policies can be formulated by security architects to translate from attributes to rights. Dynamic elements can be built into these policies so the outcomes of access control decisions automatically adapt to changing local and global circumstances. On the benefits side this leap is a maturation of authorization matching the needs of emerging cyber technologies and systems. On the risks side devolving attribute management may lead to attributes of questionable provenance and value, with attendant possibility of new channels for social engineering and malware attacks. We argue that the potential benefits will lead to pervasive deployment of attribute-based access control (ABAC), and more generally attribute-based security. The cyber security research community has a responsibility to develop models, theories and systems which enable safe and chaos-free deployment of ABAC. This is the current grand challenge for access control researchers.
正在进行的从权限到属性的授权飞跃提供了许多引人注目的好处。可以相对独立地做出关于用户、主体、对象和上下文属性的决策,并对每个属性进行适当的分散。安全架构师可以制定策略,将属性转换为权限。可以将动态元素内置于这些策略中,以便访问控制决策的结果自动适应不断变化的本地和全局环境。从好处方面来看,这种飞跃是授权的成熟,与新兴网络技术和系统的需求相匹配。在风险方面,下放属性管理可能会导致属性的来源和价值存在问题,并可能为社会工程和恶意软件攻击提供新的渠道。我们认为,潜在的好处将导致基于属性的访问控制(ABAC)的广泛部署,以及更普遍的基于属性的安全性。网络安全研究界有责任开发安全、无混乱部署ABAC的模型、理论和系统。这是当前访问控制研究人员面临的重大挑战。
{"title":"The authorization leap from rights to attributes: maturation or chaos?","authors":"R. Sandhu","doi":"10.1145/2295136.2295150","DOIUrl":"https://doi.org/10.1145/2295136.2295150","url":null,"abstract":"The ongoing authorization leap from rights to attributes offers numerous compelling benefits. Decisions about user, subject, object and context attributes can be made relatively independently and with suitable decentralization appropriate for each attribute. Policies can be formulated by security architects to translate from attributes to rights. Dynamic elements can be built into these policies so the outcomes of access control decisions automatically adapt to changing local and global circumstances. On the benefits side this leap is a maturation of authorization matching the needs of emerging cyber technologies and systems. On the risks side devolving attribute management may lead to attributes of questionable provenance and value, with attendant possibility of new channels for social engineering and malware attacks. We argue that the potential benefits will lead to pervasive deployment of attribute-based access control (ABAC), and more generally attribute-based security. The cyber security research community has a responsibility to develop models, theories and systems which enable safe and chaos-free deployment of ABAC. This is the current grand challenge for access control researchers.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"1 1","pages":"69-70"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78623401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Automating architectural security analysis 自动化架构安全性分析
A. Schaad, Alexandr Garaga
In earlier work [1] we had looked at implementing the Microsoft STRIDE methodology in the context of evaluating security properties of FMC/TAM architectural diagrams. However, a major drawback of this approach is that it requires significant manual work to assess all reported potential threats, as well as identify concrete follow-ups. Equally, it is not possible to analyse an architecture from the perspective of the primary assets that require protection. This led us to two questions: a) whether using interaction information in architecture diagrams, supported by additional security semantics, can reduce the scope of analysis as well as partly automate it; b) whether using asset-centric and attacker-centric perspectives can complement the software-centric perspective of STRIDE and thus add value to the current threat model.
在早期的工作[1]中,我们研究了在评估FMC/TAM架构图的安全属性的背景下实现Microsoft STRIDE方法。然而,这种方法的一个主要缺点是它需要大量的手工工作来评估所有报告的潜在威胁,以及确定具体的后续行动。同样,从需要保护的主要资产的角度分析体系结构是不可能的。这给我们带来了两个问题:a)在架构图中使用交互信息,由额外的安全语义支持,是否可以减少分析的范围,并部分自动化分析;b)使用以资产为中心和以攻击者为中心的视角是否可以补充STRIDE的以软件为中心的视角,从而为当前的威胁模型增加价值。
{"title":"Automating architectural security analysis","authors":"A. Schaad, Alexandr Garaga","doi":"10.1145/2295136.2295162","DOIUrl":"https://doi.org/10.1145/2295136.2295162","url":null,"abstract":"In earlier work [1] we had looked at implementing the Microsoft STRIDE methodology in the context of evaluating security properties of FMC/TAM architectural diagrams. However, a major drawback of this approach is that it requires significant manual work to assess all reported potential threats, as well as identify concrete follow-ups. Equally, it is not possible to analyse an architecture from the perspective of the primary assets that require protection. This led us to two questions:\u0000 a) whether using interaction information in architecture diagrams, supported by additional security semantics, can reduce the scope of analysis as well as partly automate it;\u0000 b) whether using asset-centric and attacker-centric perspectives can complement the software-centric perspective of STRIDE and thus add value to the current threat model.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"15 1","pages":"131-132"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85604348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms for mining meaningful roles 挖掘有意义角色的算法
Zhongyuan Xu, S. Stoller
Role-based access control (RBAC) offers significant advantages over lower-level access control policy representations, such as access control lists (ACLs). However, the effort required for a large organization to migrate from ACLs to RBAC can be a significant obstacle to adoption of RBAC. Role mining algorithms partially automate the construction of an RBAC policy from an ACL policy and possibly other information, such as user attributes. These algorithms can significantly reduce the cost of migration to RBAC. This paper proposes new algorithms for role mining. The algorithms can easily be used to optimize a variety of policy quality metrics, including metrics based on policy size, metrics based on interpretability of the roles with respect to user attribute data, and compound metrics that consider size and interpretability. The algorithms all begin with a phase that constructs a set of candidate roles. We consider two strategies for the second phase: start with an empty policy and repeatedly add candidate roles, or start with the entire set of candidate roles and repeatedly remove roles. In experiments with publicly available access control policies, we find that the elimination approach produces better results, and that, for a policy quality metric that reflects size and interpretability, our elimination algorithm achieves significantly better results than previous work.
基于角色的访问控制(RBAC)与低级访问控制策略表示(如访问控制列表(acl))相比具有显著的优势。然而,大型组织从acl迁移到RBAC所需的努力可能是采用RBAC的一个重大障碍。角色挖掘算法可以从ACL策略和可能的其他信息(如用户属性)部分地自动化构建RBAC策略。这些算法可以显著降低迁移到RBAC的成本。本文提出了新的角色挖掘算法。这些算法可以很容易地用于优化各种策略质量度量,包括基于策略大小的度量、基于角色相对于用户属性数据的可解释性的度量,以及考虑大小和可解释性的复合度量。这些算法都是从构造一组候选角色的阶段开始的。我们考虑第二阶段的两种策略:从空策略开始并反复添加候选角色,或者从整个候选角色集开始并反复删除角色。在公开访问控制策略的实验中,我们发现消除方法产生了更好的结果,并且,对于反映大小和可解释性的策略质量度量,我们的消除算法取得了比以前的工作更好的结果。
{"title":"Algorithms for mining meaningful roles","authors":"Zhongyuan Xu, S. Stoller","doi":"10.1145/2295136.2295146","DOIUrl":"https://doi.org/10.1145/2295136.2295146","url":null,"abstract":"Role-based access control (RBAC) offers significant advantages over lower-level access control policy representations, such as access control lists (ACLs). However, the effort required for a large organization to migrate from ACLs to RBAC can be a significant obstacle to adoption of RBAC. Role mining algorithms partially automate the construction of an RBAC policy from an ACL policy and possibly other information, such as user attributes. These algorithms can significantly reduce the cost of migration to RBAC.\u0000 This paper proposes new algorithms for role mining. The algorithms can easily be used to optimize a variety of policy quality metrics, including metrics based on policy size, metrics based on interpretability of the roles with respect to user attribute data, and compound metrics that consider size and interpretability. The algorithms all begin with a phase that constructs a set of candidate roles. We consider two strategies for the second phase: start with an empty policy and repeatedly add candidate roles, or start with the entire set of candidate roles and repeatedly remove roles. In experiments with publicly available access control policies, we find that the elimination approach produces better results, and that, for a policy quality metric that reflects size and interpretability, our elimination algorithm achieves significantly better results than previous work.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"17 1","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87890224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Efficient privacy preserving content based publish subscribe systems 高效的基于内容的隐私保护发布订阅系统
Mohamed Nabeel, Ning Shang, E. Bertino
The ability to seamlessly scale on demand has made Content-Based Publish-Subscribe (CBPS) systems the choice of distributing messages/documents produced by Content Publishers to many Subscribers through Content Brokers. Most of the current systems assume that Content Brokers are trusted for the confidentiality of the data published by Content Publishers and the privacy of the subscriptions, which specify their interests, made by Subscribers. However, with the increased use of technologies, such as service oriented architectures and cloud computing, essentially outsourcing the broker functionality to third-party providers, one can no longer assume the trust relationship to hold. The problem of providing privacy/confidentiality in CBPS systems is challenging, since the solution to the problem should allow Content Brokers to make routing decisions based on the content without revealing the content to them. The previous work attempted to solve this problem was not fully successful. The problem may appear unsolvable since it involves conflicting goals, but in this paper, we propose a novel approach to preserve the privacy of the subscriptions made by Subscribers and confidentiality of the data published by Content Publishers using cryptographic techniques when third-party Content Brokers are utilized to make routing decisions based on the content. Our protocols are expressive to support any type of subscriptions and designed to work efficiently. We distribute the work such that the load on Content Brokers, where the bottleneck is in a CBPS system, is minimized. We extend a popular CBPS system using our protocols to implement a privacy preserving CBPS system.
无缝按需扩展的能力使得基于内容的发布-订阅(CBPS)系统可以选择通过内容代理将内容发布者生成的消息/文档分发给许多订阅者。当前的大多数系统都假定内容代理是可信的,因为内容发布者发布的数据具有机密性,订阅者发布的订阅具有隐私性(订阅指定了它们的兴趣)。然而,随着技术(如面向服务的体系结构和云计算)使用的增加,实质上将代理功能外包给第三方提供商,人们不能再假设信任关系能够保持下去。在CBPS系统中提供隐私/机密性的问题是具有挑战性的,因为该问题的解决方案应该允许内容代理根据内容做出路由决策,而不会向它们透露内容。以前试图解决这个问题的工作并不完全成功。这个问题似乎无法解决,因为它涉及到相互冲突的目标,但在本文中,我们提出了一种新的方法,当使用第三方内容代理根据内容做出路由决策时,使用加密技术来保护订阅者所做订阅的隐私性和内容发布者所发布数据的机密性。我们的协议具有表达能力,可以支持任何类型的订阅,并且可以高效地工作。我们对工作进行分配,使CBPS系统中瓶颈所在的Content broker上的负载最小化。我们使用我们的协议扩展了一个流行的CBPS系统,以实现一个保护隐私的CBPS系统。
{"title":"Efficient privacy preserving content based publish subscribe systems","authors":"Mohamed Nabeel, Ning Shang, E. Bertino","doi":"10.1145/2295136.2295164","DOIUrl":"https://doi.org/10.1145/2295136.2295164","url":null,"abstract":"The ability to seamlessly scale on demand has made Content-Based Publish-Subscribe (CBPS) systems the choice of distributing messages/documents produced by Content Publishers to many Subscribers through Content Brokers. Most of the current systems assume that Content Brokers are trusted for the confidentiality of the data published by Content Publishers and the privacy of the subscriptions, which specify their interests, made by Subscribers. However, with the increased use of technologies, such as service oriented architectures and cloud computing, essentially outsourcing the broker functionality to third-party providers, one can no longer assume the trust relationship to hold. The problem of providing privacy/confidentiality in CBPS systems is challenging, since the solution to the problem should allow Content Brokers to make routing decisions based on the content without revealing the content to them. The previous work attempted to solve this problem was not fully successful. The problem may appear unsolvable since it involves conflicting goals, but in this paper, we propose a novel approach to preserve the privacy of the subscriptions made by Subscribers and confidentiality of the data published by Content Publishers using cryptographic techniques when third-party Content Brokers are utilized to make routing decisions based on the content. Our protocols are expressive to support any type of subscriptions and designed to work efficiently. We distribute the work such that the load on Content Brokers, where the bottleneck is in a CBPS system, is minimized. We extend a popular CBPS system using our protocols to implement a privacy preserving CBPS system.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"147 1","pages":"133-144"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86650687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Emerging trends around big data analytics and security: panel 围绕大数据分析和安全的新兴趋势:专题讨论
Rafae Bhatti, R. LaSalle, Robert Bird, T. Grance, E. Bertino
This panel will discuss the interplay between key emerging security trends centered around big data analytics and security. With the explosion of big data and advent of cloud computing, data analytics has not only become prevalent but also a critical business need. Internet applications today consume vast amounts of data collected from heterogeneous big data repositories and provide meaningful insights from it. These include applications for business forecasting, investment and finance, healthcare and well-being, science and hi-tech, to name a few. Security and operational intelligence is one of the critical areas where big data analytics is expected to play a crucial role. Security analytics in a big data environment presents a unique set of challenges, not properly addressed by the existing security incident and event monitoring (or SIEM) systems that typically work with a limited set of traditional data sources (firewall, IDS, etc.) in an enterprise network. A big data environment presents both a great opportunity and a challenge due to the explosion and heterogeneity of the potential data sources that extend the boundary of analytics to social networks, real time streams and other forms of highly contextual data that is characterized by high volume and speed. In addition to meeting infrastructure challenges, there remain additional unaddressed issues, including but not limited to development of self-evolving threat ontologies, integrated network and application layer analytics, and detection of "low and slow" attacks. At the same time, security analytics requires a high degree of data assurance, where assurance implies that the data be trustworthy as well as managed in a privacy preserving manner. Our panelists represent individuals from industry, academia, and government who are at the forefront of big data security analytics. They will provide insights into these unique challenges, survey the emerging trends, and lay out a vision for future.
该小组将讨论以大数据分析和安全为中心的主要新兴安全趋势之间的相互作用。随着大数据的爆炸式增长和云计算的出现,数据分析不仅变得普遍,而且成为关键的业务需求。今天的互联网应用程序消耗从异构大数据存储库收集的大量数据,并从中提供有意义的见解。这些应用包括商业预测、投资和金融、医疗保健和福祉、科学和高科技等。安全和运营情报是大数据分析有望发挥关键作用的关键领域之一。大数据环境中的安全分析提出了一系列独特的挑战,而现有的安全事件和事件监控(或SIEM)系统通常无法正确解决这些挑战,这些系统通常使用企业网络中有限的一组传统数据源(防火墙、IDS等)。由于潜在数据源的爆炸式增长和异构性,大数据环境既带来了巨大的机遇,也带来了巨大的挑战,这些数据源将分析的边界扩展到社交网络、实时流和其他形式的高度上下文数据,这些数据以高容量和高速度为特征。除了应对基础设施的挑战外,还有其他未解决的问题,包括但不限于自进化威胁本体的开发、集成网络和应用层分析以及“低而慢”攻击的检测。同时,安全分析需要高度的数据保证,其中保证意味着数据是可信的,并且以保护隐私的方式进行管理。我们的小组成员代表了来自工业界、学术界和政府的个人,他们处于大数据安全分析的前沿。他们将提供对这些独特挑战的见解,调查新兴趋势,并提出未来的愿景。
{"title":"Emerging trends around big data analytics and security: panel","authors":"Rafae Bhatti, R. LaSalle, Robert Bird, T. Grance, E. Bertino","doi":"10.1145/2295136.2295148","DOIUrl":"https://doi.org/10.1145/2295136.2295148","url":null,"abstract":"This panel will discuss the interplay between key emerging security trends centered around big data analytics and security. With the explosion of big data and advent of cloud computing, data analytics has not only become prevalent but also a critical business need. Internet applications today consume vast amounts of data collected from heterogeneous big data repositories and provide meaningful insights from it. These include applications for business forecasting, investment and finance, healthcare and well-being, science and hi-tech, to name a few. Security and operational intelligence is one of the critical areas where big data analytics is expected to play a crucial role. Security analytics in a big data environment presents a unique set of challenges, not properly addressed by the existing security incident and event monitoring (or SIEM) systems that typically work with a limited set of traditional data sources (firewall, IDS, etc.) in an enterprise network. A big data environment presents both a great opportunity and a challenge due to the explosion and heterogeneity of the potential data sources that extend the boundary of analytics to social networks, real time streams and other forms of highly contextual data that is characterized by high volume and speed. In addition to meeting infrastructure challenges, there remain additional unaddressed issues, including but not limited to development of self-evolving threat ontologies, integrated network and application layer analytics, and detection of \"low and slow\" attacks. At the same time, security analytics requires a high degree of data assurance, where assurance implies that the data be trustworthy as well as managed in a privacy preserving manner. Our panelists represent individuals from industry, academia, and government who are at the forefront of big data security analytics. They will provide insights into these unique challenges, survey the emerging trends, and lay out a vision for future.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"23 1","pages":"67-68"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83980035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Policy-by-example for online social networks 在线社交网络的实例策略
Gorrell P. Cheek, Mohamed Shehab
We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, we introduce a policy management approach that leverages a user's memory and opinion of their friends to set policies for other similar friends. We refer to this new approach as Same-As Policy Management. To demonstrate the effectiveness of our policy management improvements, we implemented a prototype Facebook application and conducted an extensive user study. Leveraging proven clustering techniques, we demonstrated a 23% reduction in friend grouping time. In addition, we demonstrated considerable reductions in policy authoring time using Same-As Policy Management over traditional group based policy management approaches. Finally, we presented user perceptions of both improvements, which are very encouraging.
我们介绍了两种改进在线社交网络隐私政策管理的方法。首先,我们介绍了一种使用经过验证的聚类技术的机制,该机制可以帮助用户为基于组的策略管理方法对他们的朋友进行分组。其次,我们引入了一种策略管理方法,利用用户的记忆和朋友的意见来为其他类似的朋友设置策略。我们将这种新方法称为相同策略管理。为了证明策略管理改进的有效性,我们实现了一个原型Facebook应用程序,并进行了广泛的用户研究。利用成熟的聚类技术,我们证明了朋友分组时间减少了23%。此外,我们还演示了与传统的基于组的策略管理方法相比,使用相同策略管理大大减少了策略编写时间。最后,我们介绍了用户对这两项改进的看法,这是非常令人鼓舞的。
{"title":"Policy-by-example for online social networks","authors":"Gorrell P. Cheek, Mohamed Shehab","doi":"10.1145/2295136.2295142","DOIUrl":"https://doi.org/10.1145/2295136.2295142","url":null,"abstract":"We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, we introduce a policy management approach that leverages a user's memory and opinion of their friends to set policies for other similar friends. We refer to this new approach as Same-As Policy Management. To demonstrate the effectiveness of our policy management improvements, we implemented a prototype Facebook application and conducted an extensive user study. Leveraging proven clustering techniques, we demonstrated a 23% reduction in friend grouping time. In addition, we demonstrated considerable reductions in policy authoring time using Same-As Policy Management over traditional group based policy management approaches. Finally, we presented user perceptions of both improvements, which are very encouraging.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"16 12","pages":"23-32"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91495554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Analyzing temporal role based access control models 分析基于临时角色的访问控制模型
Emre Uzun, V. Atluri, S. Sural, Jaideep Vaidya, G. Parlato, A. L. Ferrara, P. Madhusudan
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the authorization as well as the administrative models for RBAC have been adopted in recent years. In this paper, we consider the temporal extension of RBAC (TRBAC), and develop safety analysis techniques for it. Safety analysis is essential for understanding the implications of security policies both at the stage of specification and modification. Towards this end, in this paper, we first define an administrative model for TRBAC. Our strategy for performing safety analysis is to appropriately decompose the TRBAC analysis problem into multiple subproblems similar to RBAC. Along with making the analysis simpler, this enables us to leverage and adapt existing analysis techniques developed for traditional RBAC. We have adapted and experimented with employing two state of the art analysis approaches developed for RBAC as well as tools developed for software testing. Our results show that our approach is both feasible and flexible.
如今,基于角色的访问控制(RBAC)是用于高级访问控制的事实上的模型,并被广泛部署在各种规模的企业中。近年来,对RBAC的授权和管理模型采用了几种扩展。在本文中,我们考虑了RBAC (TRBAC)的时间扩展,并开发了它的安全性分析技术。在规范和修改阶段,安全分析对于理解安全策略的含义至关重要。为此,在本文中,我们首先定义了TRBAC的管理模型。我们进行安全性分析的策略是将TRBAC分析问题适当分解为多个类似于RBAC的子问题。除了使分析更简单之外,这还使我们能够利用和适应为传统RBAC开发的现有分析技术。我们已经适应并尝试使用为RBAC开发的两种最先进的分析方法以及为软件测试开发的工具。结果表明,该方法既可行又灵活。
{"title":"Analyzing temporal role based access control models","authors":"Emre Uzun, V. Atluri, S. Sural, Jaideep Vaidya, G. Parlato, A. L. Ferrara, P. Madhusudan","doi":"10.1145/2295136.2295169","DOIUrl":"https://doi.org/10.1145/2295136.2295169","url":null,"abstract":"Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the authorization as well as the administrative models for RBAC have been adopted in recent years. In this paper, we consider the temporal extension of RBAC (TRBAC), and develop safety analysis techniques for it. Safety analysis is essential for understanding the implications of security policies both at the stage of specification and modification. Towards this end, in this paper, we first define an administrative model for TRBAC. Our strategy for performing safety analysis is to appropriately decompose the TRBAC analysis problem into multiple subproblems similar to RBAC. Along with making the analysis simpler, this enables us to leverage and adapt existing analysis techniques developed for traditional RBAC. We have adapted and experimented with employing two state of the art analysis approaches developed for RBAC as well as tools developed for software testing. Our results show that our approach is both feasible and flexible.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"28 1","pages":"177-186"},"PeriodicalIF":0.0,"publicationDate":"2012-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81868867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1