Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties

被引:2
|
作者
Krautsevich, Leanid [1 ]
Lazouski, Aliaksandr [2 ]
Martinelli, Fabio [2 ]
Yautsiukhin, Artsiom [2 ]
机构
[1] Univ Pisa, Dept Comp Sci, I-56127 Pisa, Italy
[2] CNR, Ist Informat & Telemat, I-56124 Pisa, Italy
来源
IEEE SYSTEMS JOURNAL | 2013年 / 7卷 / 02期
基金
欧盟第七框架计划;
关键词
Costs; freshness; Markov chains; mutable attribute; policy enforcement; usage control; MANAGEMENT; SECURITY;
D O I
10.1109/JSYST.2012.2221911
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In usage control, access decisions rely on mutable attributes. A reference monitor should reevaluate security policies each time attributes change their values. Identifying all attribute changes in a timely manner is a challenging issue, especially if the attribute provider and the reference monitor reside in different security domains. Some attribute changes might be missed, corrupted, and delayed. As a result, the reference monitor may erroneously grant access to malicious users and forbid it for eligible ones. This paper proposes a set of policy enforcement models that help mitigate the uncertainties associated with mutable attributes. In our model, the reference monitor, as usual, evaluates logical predicates over attributes and, additionally, makes some estimates on how much observed attribute values differ from reality. The final access decision takes into account both factors. We assign costs for granting and revoking access to legitimate and malicious users and compare the proposed policy enforcement models in terms of cost efficiency.
引用
收藏
页码:223 / 235
页数:13
相关论文
共 50 条
  • [21] Cost-Effective Energy Usage in a Microgrid Using a Learning Algorithm
    Essayeh, Chaimaa
    El-Fenni, Mohammed Raiss
    Dahmouni, Hamza
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [22] Is It Cost-Effective to Share Roadside Infrastructure for Internet Access?
    Ligo, Alexandre K.
    Peha, Jon M.
    Barros, Joao
    2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [23] AN ASSESSMENT OF BARRIERS TO FAIR ACCESS TO COST-EFFECTIVE DRUGS
    Beinfeld, M.
    Emond, S. K.
    Pearson, S. D.
    VALUE IN HEALTH, 2022, 25 (07) : S287 - S287
  • [24] Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control
    Lu, Jianfeng
    Li, Ruixuan
    Lu, Zhengding
    Hu, Jinwei
    Ma, Xiaopu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 403 - 410
  • [25] Cost-effective optical ethernet solutions for access networks
    Jin, YZ
    Tsang, L
    APOC 2002: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATION; METRO AND ACCESS NETWORKS II, 2002, 4908 : 54 - 65
  • [26] Cost-effective optical module for optical access system
    Tanaka, H
    Nakata, N
    Okada, K
    IEEE PHOTONICS TECHNOLOGY LETTERS, 1998, 10 (03) : 436 - 438
  • [27] Automatic enforcement of access control policies among dynamic coalitions
    Atluri, V
    Warner, J
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 369 - 378
  • [28] From Formal Access Control Policies to Runtime Enforcement Aspects
    Kallel, Slim
    Charfi, Anis
    Mezini, Mira
    Jmaiel, Mohamed
    Klose, Karl
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 16 - +
  • [29] A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies
    Margheri, Andrea
    Masi, Massimiliano
    Pugliese, Rosario
    Tiezzi, Francesco
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (01) : 2 - 33
  • [30] Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud
    Morelli, Umberto
    Ranise, Silvio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 296 - 309