Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems

被引:6
|
作者
Mell, Peter [1 ]
Shook, James M. [1 ]
Gavrila, Serban [1 ]
机构
[1] NIST, 100 Bur Dr, Gaithersburg, MD 20899 USA
来源
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS | 2016年
关键词
ABAC; access control; algorithms; complexity; computer security; graph theory; insider; NIST; NGAC; Policy Machine; simultaneous instantiation; XaCML;
D O I
10.1145/2995959.2995961
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The American National Standards Institute (ANSI) has standardized an access control approach, Next Generation Access Control (NGAC), that enables simultaneous instantiation of multiple access control policies. For large complex enterprises this is critical to limiting the authorized access of insiders. However, the specifications describe the required access control capabilities but not the related algorithms. While appropriate, this leave open the important question as to whether or not NGAC is scalable. Existing cubic reference implementations indicate that it does not. For example, the primary NGAC reference implementation took several minutes to simply display the set of files accessible to a user on a moderately sized system. To solve this problem we provide an efficient access control decision algorithm, reducing the overall complexity from cubic to linear. Our other major contribution is to provide a novel mechanism for administrators and users to review allowed access rights. We provide an interface that appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. These capabilities help limit insider access to information (and thereby limit information leakage) by enabling the efficient simultaneous instantiation of multiple access control policies.
引用
收藏
页码:13 / 21
页数:9
相关论文
共 50 条
  • [21] Flexible policy access control model for workflow systems
    Ma, Chen-Hua
    Lu, Guo-Dong
    Qiu, Jiong
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2008, 42 (12): : 2112 - 2120
  • [22] Restricting access to antibiotics: The effectiveness of a ?no repeats? government policy intervention
    Contreras, Juliet
    Oguoma, Victor
    Todd, Lyn
    Naunton, Mark
    Collignon, Peter
    Bushell, Mary
    RESEARCH IN SOCIAL & ADMINISTRATIVE PHARMACY, 2023, 19 (05): : 800 - 806
  • [23] Efficient Policy Analysis for Administrative Role Based Access Control
    Stoller, Scott D.
    Yang, Ping
    Ramakrishnan, C. R.
    Gofman, Mikhail I.
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 445 - +
  • [24] Efficient access control for distributed hierarchical file systems
    Pollack, KT
    Brandt, SA
    TWENTY-SECOND IEEE/THIRTEENTH NASA GODDARD CONFERENCE ON MASS STORAGE SYSTEMS AND TECHNOLOGIES, PROCEEDINGS: INFORMATION RETRIEVAL FROM VERY LARGE STORAGE SYSTEMS, 2005, : 253 - 260
  • [25] Efficient Evaluation of Location Predicates for Access Control Systems
    Marcus, Philipp
    Linnhoff-Popien, Claudia
    2012 SIXTH UKSIM/AMSS EUROPEAN SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS), 2012, : 385 - 390
  • [26] Dealing with multi-policy security in large open distributed systems
    Bidan, C
    Issarny, V
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 51 - 66
  • [27] Insider Threat Likelihood Assessment for Flexible Access Control
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 77 - 95
  • [28] System control through the internet and a remote access laboratory implementation
    Dogan, Baris
    Erdal, Hasan
    ADVANCES IN WEB BASED LEARNING - ICWL 2007, 2008, 4823 : 532 - +
  • [29] Improvement of a multi-role-based access control policy
    Shen, VRL
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (07) : 1483 - 1485
  • [30] Sustainable Implementation of Access Control
    Muntean, Mihaela
    Dijmarescu, Laurentiu
    SUSTAINABILITY, 2018, 10 (06):