Evolutionary Inference of Attribute-Based Access Control Policies

被引:38
|
作者
Medvet, Eric [1 ]
Bartoli, Alberto [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
机构
[1] Univ Trieste, Dipartimento Ingn & Architettura, Trieste, Italy
[2] Univ Insubria, Dipartimento Sci Teor & Applicate, Como, Italy
关键词
D O I
10.1007/978-3-319-15934-8_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The interest in attribute-based access control policies is increasingly growing due to their ability to accommodate the complex security requirements of modern computer systems. With this novel paradigm, access control policies consist of attribute expressions which implicitly describe the properties of subjects and protection objects and which must be satisfied for a request to be allowed. Since specifying a policy in this framework may be very complex, approaches for policy mining, i.e., for inferring a specification automatically from examples in the form of logs of authorized and denied requests, have been recently proposed. In this work, we propose a multi-objective evolutionary approach for solving the policy mining task. We designed and implemented a problem representation suitable for evolutionary computation, along with several search-optimizing features which have proven to be highly useful in this context: a strategy for learning a policy by learning single rules, each one focused on a subset of requests; a custom initialization of the population; a scheme for diversity promotion and for early termination. We show that our approach deals successfully with case studies of realistic complexity.
引用
收藏
页码:351 / 365
页数:15
相关论文
共 50 条
  • [41] Anonymity in Attribute-Based Access Control: Framework and Metric
    Zhang, Runnan
    Liu, Gang
    Kang, Hongzhaoning
    Wang, Quan
    Wan, Bo
    Luo, Nan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 463 - 475
  • [42] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [43] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
  • [44] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
  • [45] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    [J]. JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [46] Automated trust negotiation in attribute-based access control
    Winsborough, WH
    Jacobs, J
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 252 - 257
  • [47] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Verleker, Ashwin Prabhu
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
  • [48] Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System
    Shen, Zhuoxiang
    Gao, Neng
    Liu, Zeyi
    Li, Min
    Wang, Chuanyin
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 110 - 125
  • [49] Attribute-based access control management for multicloud collaboration
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [50] An attribute-based access control model for Web services
    Shen Hai-bo
    Hong Fan
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 74 - +