Policy Adaptation in Hierarchical Attribute-based Access Control Systems

被引:6
|
作者
Das, Saptarshi [1 ]
Sural, Shamik [1 ]
Vaidya, Jaideep [2 ,3 ]
Atluri, Vijayalakshmi [2 ,3 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
[2] Rutgers Business Sch, Newark, NJ USA
[3] Rutgers State Univ, MSIS Dept, 1 Washington Pk, Newark, NJ 07102 USA
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
ABAC policy; policy adaptation; attribute value hierarchy;
D O I
10.1145/3323233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Attribute-Based Access Control (ABAC), access to resources is given based on the attributes of subjects, objects, and environment. There is an imminent need for the development of efficient algorithms that enable migration to ABAC. However, existing policy mining approaches do not consider possible adaptation to the policy of a similar organization. In this article, we address the problem of automatically determining an optimal assignment of attribute values to subjects for enabling the desired accesses to be granted while minimizing the number of ABAC rules used by each subject or other appropriate metrics. We show the problem to be NP-Complete and propose a heuristic solution.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] An efficient attribute-based hierarchical data access control scheme in cloud computing
    He, Heng
    Zheng, Liang-han
    Li, Peng
    Deng, Li
    Huang, Li
    Chen, Xiang
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [32] ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST
    Quan, Shan
    Zhao, Yongdan
    Helil, Nurmamat
    [J]. COMPUTING AND INFORMATICS, 2023, 42 (03) : 615 - 650
  • [33] Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption
    Asim, Muhammad
    Ignatenko, Tanya
    Petkovic, Milan
    Trivellato, Daniel
    Zannone, Nicola
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 212 - 217
  • [34] In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control
    Heutelbeck, Dominic
    Baur, Marc Lucas
    Kluba, Martin
    [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 59 - 70
  • [35] Attribute-based Access Control Model in Healthcare Systems with Blockchain Technology
    Arora, Prince
    Bhagat, Avinash
    Kumar, Mukesh
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 793 - 803
  • [36] Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems
    Roy, Arindam
    Sural, Shamik
    Majumdar, Arun Kumar
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 1901 - 1913
  • [37] Securing Smart Home IoT Systems with Attribute-Based Access Control
    Goyal, Gaurav
    Liu, Peng
    Sural, Shamik
    [J]. SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 37 - 46
  • [38] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [39] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [40] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
    LeMay, Michael
    Fatemieh, Omid
    Gunter, Carl A.
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214