Evolutionary Inference of Attribute-Based Access Control Policies

被引:38
|
作者
Medvet, Eric [1 ]
Bartoli, Alberto [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
机构
[1] Univ Trieste, Dipartimento Ingn & Architettura, Trieste, Italy
[2] Univ Insubria, Dipartimento Sci Teor & Applicate, Como, Italy
关键词
D O I
10.1007/978-3-319-15934-8_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The interest in attribute-based access control policies is increasingly growing due to their ability to accommodate the complex security requirements of modern computer systems. With this novel paradigm, access control policies consist of attribute expressions which implicitly describe the properties of subjects and protection objects and which must be satisfied for a request to be allowed. Since specifying a policy in this framework may be very complex, approaches for policy mining, i.e., for inferring a specification automatically from examples in the form of logs of authorized and denied requests, have been recently proposed. In this work, we propose a multi-objective evolutionary approach for solving the policy mining task. We designed and implemented a problem representation suitable for evolutionary computation, along with several search-optimizing features which have proven to be highly useful in this context: a strategy for learning a policy by learning single rules, each one focused on a subset of requests; a custom initialization of the population; a scheme for diversity promotion and for early termination. We show that our approach deals successfully with case studies of realistic complexity.
引用
收藏
页码:351 / 365
页数:15
相关论文
共 50 条
  • [1] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [2] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [3] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [4] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [5] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [6] Specification and Analysis of Attribute-Based Access Control Policies: An Overview
    Xu, Dianxiang
    Zhang, Yunpeng
    [J]. 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
  • [7] Attribute-based access control with hidden policies and hidden credentials
    Frikken, Keith
    Atallah, Mikhail
    Li, Jiangtao
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (10) : 1259 - 1270
  • [8] VisMAP: Visual Mining of Attribute-Based Access Control Policies
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Rigoll, Gerhard
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
  • [9] Polisma - A Framework for Learning Attribute-Based Access Control Policies
    Abu Jabal, Amani
    Bertino, Elisa
    Lobo, Jorge
    Law, Mark
    Russo, Alessandra
    Calo, Seraphin
    Verma, Dinesh
    [J]. COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
  • [10] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88