Resiliency Policies in Access Control

被引:15
|
作者
Li, Ninghui [1 ]
Wang, Qihua [1 ]
Tripunitara, Mahesh
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
关键词
Security; Theory; Access control; fault-tolerant; policy design; PROTECTION;
D O I
10.1145/1513601.1513602
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An example resiliency policy requires that upon removal of any s users, there should still exist d disjoint sets of users such that the users in each set together possess certain permissions of interest. Such a policy ensures that even when emergency situations cause some users to be absent, there still exist independent teams of users that have the permissions necessary for carrying out critical tasks. The Resiliency Checking Problem determines whether an access control state satisfies a given resiliency policy. We show that the general case of the problem and several subcases are intractable (NP-hard), and identify two subcases that are solvable in linear time. For the intractable cases, we also identify the complexity class in the polynomial hierarchy to which these problems belong. We discuss the design and evaluation of an algorithm that can efficiently solve instances of nontrivial sizes that belong to the intractable cases of the problem. Furthermore, we study the consistency problem between resiliency policies and static separation of duty policies. Finally, we combine the notions of resiliency and separation of duty to introduce the resilient separation of duty policy, which is useful in situations where both fault-tolerance and fraud-prevention are desired.
引用
收藏
页数:34
相关论文
共 50 条
  • [1] A Multivariate Approach for Checking Resiliency in Access Control
    Crampton, Jason
    Gutin, Gregory
    Watrigant, Remi
    [J]. ALGORITHMIC ASPECTS IN INFORMATION AND MANAGEMENT, 2016, 9778 : 173 - 184
  • [2] Access control policies and languages
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Samarati, Pierangela
    Jajodia, Sushil
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2007, 3 (02) : 94 - 102
  • [3] On the negotiation of access control policies
    Gligor, VD
    Khurana, H
    Koleva, RK
    Bharadwaj, VG
    Baras, JS
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 188 - 201
  • [4] Optimization of Access Control Policies
    Kern, Sascha
    Baumer, Thomas
    Groll, Sebastian
    Fuchs, Ludwig
    Pernul, Guenther
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [5] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [6] Privacy Policies Model in Access Control
    Werner, Jorge
    Westphall, Carla Merkle
    Vargas, Andre Azevedo
    Westphall, Carlos Becker
    [J]. 2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
  • [7] Adventures in the Analysis of Access Control Policies
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 467 - 482
  • [8] Automated decomposition of access control policies
    Su, LY
    Chadwick, DW
    Basden, A
    Cunningham, JA
    [J]. SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 3 - 13
  • [9] Access Control Policies for Semantic Networks
    Ryutov, Tatyana
    Kichkaylo, Tatiana
    Neches, Robert
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 150 - 157
  • [10] Testing Access Control and Obligation Policies
    Xu, Dianxiang
    Sanford, Michael
    Liu, Zhaoliang
    Emry, Mark
    Brockmueller, Brad
    Johnson, Spencer
    To, Michael
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,