Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems

被引:6
|
作者
Mell, Peter [1 ]
Shook, James M. [1 ]
Gavrila, Serban [1 ]
机构
[1] NIST, 100 Bur Dr, Gaithersburg, MD 20899 USA
关键词
ABAC; access control; algorithms; complexity; computer security; graph theory; insider; NIST; NGAC; Policy Machine; simultaneous instantiation; XaCML;
D O I
10.1145/2995959.2995961
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The American National Standards Institute (ANSI) has standardized an access control approach, Next Generation Access Control (NGAC), that enables simultaneous instantiation of multiple access control policies. For large complex enterprises this is critical to limiting the authorized access of insiders. However, the specifications describe the required access control capabilities but not the related algorithms. While appropriate, this leave open the important question as to whether or not NGAC is scalable. Existing cubic reference implementations indicate that it does not. For example, the primary NGAC reference implementation took several minutes to simply display the set of files accessible to a user on a moderately sized system. To solve this problem we provide an efficient access control decision algorithm, reducing the overall complexity from cubic to linear. Our other major contribution is to provide a novel mechanism for administrators and users to review allowed access rights. We provide an interface that appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. These capabilities help limit insider access to information (and thereby limit information leakage) by enabling the efficient simultaneous instantiation of multiple access control policies.
引用
收藏
页码:13 / 21
页数:9
相关论文
共 50 条
  • [1] A multi-policy model for access control in Cooperative Information Systems
    Huin, Leslie
    Disson, Eric
    Boulanger, Danielle
    8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012), 2012, : 996 - 1001
  • [2] A multi-policy access model for cooperative information systems
    Disson, E
    Boulanger, D
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2003, : 86 - 91
  • [3] Research on Multi-policy Supporting Access Control Model
    Jing, Wang
    Lian-xing, Jia
    Zhi, Lin
    PROCEEDINGS OF THE 2011 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2011, : 185 - 195
  • [4] Multi-policy access control considering privacy in ubiquitous environment
    Kim, Kyu-il
    Hwang, Hyun-Sik
    Ko, Hyuk-Jin
    Lee, Hae-Kyung
    Kim, Ung-mo
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 216 - +
  • [5] Multi-policy access control model for workflow management system
    Yu, Ling
    Chen, Bo
    Xiao, Jun-Mo
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2009, 29 (02): : 151 - 158
  • [6] PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems
    Lee, Yu-Tsung
    Enck, William
    Chen, Haining
    Vijayakumar, Hayawardh
    Li, Ninghui
    Qian, Zhiyun
    Wang, Daimeng
    Petracca, Giuseppe
    Jaeger, Trent
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2579 - 2596
  • [7] Using Access Control to Mitigate Insider Threats to Healthcare Systems
    Alshehri, Suhair
    Mishra, Sumita
    Raj, Rajendra K.
    2016 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI), 2016, : 55 - 60
  • [8] Design and implementation of access control policy for XML documents
    Han, Tao
    Journal of Computational Information Systems, 2008, 4 (01): : 329 - 334
  • [9] A multi-policy, cooperative playback control protocol
    Fortino, G
    Mastroianni, C
    Russo, W
    THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 297 - 302
  • [10] Implementation of Mandatory Access Control in Distributed Systems
    Belim, S. V.
    Belim, S. Yu.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 1124 - 1126