Towards Efficient Evaluation of XACML Policies

被引:0
|
作者
Mourad, Azzam [1 ]
Jebbaoui, Hussein [1 ]
机构
[1] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
关键词
Web Services Security; Set-Based Algebra; Policy Evaluation; Real-Time Decision; Access Control; XACML;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Policy-based computing is taking an increasing role in providing real-time decisions and governing the systematic interaction among distributed cloud and Web services. XACML has been known as the de facto standard widely used by many vendors for specifying access control and context-aware policies. Accordingly, the size and complexity of XACML policies are significantly growing to cope with the evolution of web-based applications. This growth raised many concerns related to the efficiency of real-time decision process (i.e. policy evaluation). This paper is addressing this concern through the elaboration of SBA-XACML, a novel set-based algebra scheme that provides efficient evaluation of XACML policies. Our approach constitutes of elaborating (1) set-based language that covers all the XACML components and establish an intermediate layer to which policies are automatically converted, and (2) policy evaluation module that provides better performance compared to the industrial standard Sun Policy Decision Point (PDP) and its corresponding ameliorations. Experiments have been conducted on real-life and synthetic XACML policies in order to demonstrate the efficiency, relevance and scalability of our proposition. The experimental results explore that SBA-XACML evaluation of large and small sizes policies offers better performance than the current approaches, by a factor ranging between 2.4 and 15 times faster depending on policy size.
引用
收藏
页码:164 / 171
页数:8
相关论文
共 50 条
  • [41] XACSim: a new tool for measuring similarity of XACML security policies
    Katebi, Zahra
    Nassiri, Mohammad
    Rezvani, Mohsen
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3957 - 3972
  • [42] Coverage-based Test Cases Selection for XACML Policies
    Bertolino, Antonia
    Le Traon, Yves
    Lonetti, Francesca
    Marchetti, Eda
    Mouelhi, Tejeddine
    2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 12 - 21
  • [43] A Formal Approach to Automatic Testing of Security Policies Specified in XACML
    Aouadi, Mohamed H. E.
    Toumi, Khalifa
    Cavalli, Ana
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 367 - 374
  • [44] XACSim: a new tool for measuring similarity of XACML security policies
    Zahra Katebi
    Mohammad Nassiri
    Mohsen Rezvani
    Cluster Computing, 2023, 26 : 3957 - 3972
  • [45] Formal engineering of XACML access control policies in VDM++
    Bryans, Jeremy W.
    Fitzgerald, John S.
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4789 : 37 - 56
  • [46] Composing administrative scope of delegation policies based on extended XACML
    Feng, Li Xiao
    Guo, Feng Deng
    10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 467 - 470
  • [47] Adaptive XACML access policies for heterogeneous distributed IoT environments
    Riad, Khaled
    Cheng, Jieren
    INFORMATION SCIENCES, 2021, 548 : 135 - 152
  • [48] Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies
    Xu, Dianxiang
    Shen, Ning
    Zhang, Yunpeng
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) : 1551 - 1571
  • [49] Towards Learning Efficient Intervention Policies for Wearable Devices
    Saponaro, Matthew
    Wei, Haoran
    Decker, Keith
    2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, : 298 - 299
  • [50] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies
    Pardal, Miguel L.
    Harrison, Mark
    Sarma, Sanjay
    Marques, Jose Alves
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,