Qualitative Intention-aware Attribute-based Access Control Policy Refinement

被引:0
|
作者
Mitani, Shohei [1 ]
Kwon, Jonghoon [2 ]
Ghate, Nakul [1 ]
Singh, Taniya [1 ]
Ueda, Hirofumi [1 ]
Perrig, Adrian [2 ]
机构
[1] NEC Corp Ltd, Tokyo, Japan
[2] Swiss Fed Inst Technol, Zurich, Switzerland
关键词
ABAC policy; Machine learning; Decision theory; Actionable AI;
D O I
10.1145/3589608.3593841
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Designing access control policies is often expensive and tedious due to the heterogeneous systems, services, and diverse user demands. Although ABAC policy and decision engine creation methods based on machine learning have been proposed, they cannot make good access decisions for applications and situations not envisioned by the decision-makers who provide training examples. It results in over- and under-permissiveness. In this paper, we propose a framework that refines pre-developed policies. It creates a decision engine that makes better decisions than those policies. Inspired by multiple criteria decision theory, our method uses the policy manager's qualitative intentions behind their judgments to guide access decisions so that more benefits are expected. In the evaluation, we prepare a coarse and relatively elaborate policy. We refine the coarse policy to obtain a decision engine that is compared for the similarity in access decisions with the elaborate policy using AUC as a measure. The results show that our method improves the coarse policy by a difference of 12-26% in AUC and outperforms the conventional machine learning methods by a difference of 3-11% in AUC.
引用
收藏
页码:201 / 208
页数:8
相关论文
共 50 条
  • [1] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [2] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [3] Attribute-based access control policy specification language
    Ye, Chunxiao
    Zhong, Jiang
    Feng, Yong
    [J]. Journal of Southeast University (English Edition), 2008, 24 (03) : 260 - 263
  • [4] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [5] Attribute-based lightweight reconfigurable access control policy
    Xie, Rongna
    Li, Hui
    Shi, Guozhen
    Guo, Yunchuan
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
  • [6] Policy Extraction and Optimization with Access Logs for Attribute-based Access Control
    Sun, Wei
    Li, Long
    Hu, Ying
    [J]. Journal of Network Intelligence, 2023, 8 (03): : 932 - 947
  • [7] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [8] Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109
  • [9] Policy Adaptation in Hierarchical Attribute-based Access Control Systems
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [10] Attribute-Based Access Control for the Swarm With Distributed Policy Management
    Fedrecheski, Geovane
    Costa De Biase, Laisa Caroline
    Calcina-Ccori, Pablo C.
    Zuffo, Marcelo Knorich
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) : 90 - 98