Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies

被引:0
|
作者
Manar Alohaly
Hassan Takabi
Eduardo Blanco
机构
[1] University of North Texas,Department of Computer Science and Engineering
[2] College of Computer and Information Sciences,undefined
[3] Princess Nourah bint Abdulrahman University,undefined
来源
关键词
Attribute-based access control (ABAC) policy authoring natural language processing relation extraction clustering deep learning;
D O I
暂无
中图分类号
学科分类号
摘要
The National Institute of Standards and Technology (NIST) has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access control policy (NLACP) to a machine-readable form. To study the automation process, we consider the hierarchical ABAC model as our reference model since it better reflects the requirements of real-world organizations. Therefore, this paper focuses on the questions of: how can we automatically infer the hierarchical structure of an ABAC model given NLACPs; and, how can we extract and define the set of authorization attributes based on the resulting structure. To address these questions, we propose an approach built upon recent advancements in natural language processing and machine learning techniques. For such a solution, the lack of appropriate data often poses a bottleneck. Therefore, we decouple the primary contributions of this work into: (1) developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts, and (2) generating a set of realistic synthetic natural language access control policies (NLACPs) to evaluate the proposed framework. Our experimental results are promising as we achieved - in average - an F1-score of 0.96 when extracting attributes values of subjects, and 0.91 when extracting the values of objects’ attributes from natural language access control policies.
引用
收藏
相关论文
共 50 条
  • [1] Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
    Alohaly, Manar
    Takabi, Hassan
    Blanco, Eduardo
    [J]. CYBERSECURITY, 2019, 2 (01)
  • [2] Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents
    Shan, Fangfang
    Wang, Zhenyu
    Liu, Mengyao
    Zhang, Menghan
    [J]. Computers, Materials and Continua, 2024, 80 (03): : 3881 - 3902
  • [3] Towards an Automated Extraction of ABAC Constraints from Natural Language Policies
    Alohaly, Manar
    Takabi, Hassan
    Blanco, Eduardo
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 105 - 119
  • [4] Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC)
    Servos, Daniel
    Osborn, Sylvia L.
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 320 - 328
  • [5] Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System
    Shen, Zhuoxiang
    Gao, Neng
    Liu, Zeyi
    Li, Min
    Wang, Chuanyin
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 110 - 125
  • [6] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [7] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [8] CA-ABAC: Class Algebra Attribute-Based Access Control
    Buehrer, Daniel J.
    Wang, Chun-Yao
    [J]. 2012 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY WORKSHOPS (WI-IAT WORKSHOPS 2012), VOL 3, 2012, : 220 - 225
  • [9] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [10] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291