[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2613087.2613099acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

An actor-based, application-aware access control evaluation framework

Published: 25 June 2014 Publication History

Abstract

To date, most work regarding the formal analysis of access control schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property that exists in an *absolute* sense, detached from the application context within which an access control scheme will ultimately be deployed. By contrast, we formalize the access control *suitability analysis problem*, which seeks to evaluate the degree to which a set of candidate access control schemes can meet the needs of an application-specific workload. This process involves both reductions to assess whether a scheme is *capable* of implementing a workload (qualitative analysis), as well as cost analysis using ordered measures to quantify the *overheads* of using each candidate scheme to service the workload (quantitative analysis). We formalize the two-facet suitability analysis problem, which formally describes this task. We then develop a mathematical framework for this type of analysis, and evaluate this framework both formally, by quantifying its efficiency and accuracy properties, and practically, by exploring an academic program committee workload.

References

[1]
P. Ammann, R. J. Lipton, and R. S. Sandhu. The expressive power of multi-parent creation in monotonic access control models. JCS, 4(2/3):149--166, 1996.
[2]
Kay S. Anderson et al. Sword: scalable and exible workload generator for distributed data processing systems. In Winter Simulation Conference (WSC), pages 2109--2116, Dec 2006.
[3]
A. Chander, J. C. Mitchell, and D. Dean. A state-transition model of trust management and access control. In IEEE CSFW, pages 27--43, 2001.
[4]
J. Crampton, G. Gutin, and A. Yeo. On the parameterized complexity and kernelization of the work ow satis ability problem. ACM TISSEC, 16(1), 2013.
[5]
David F. Ferraiolo et al. Proposed nist standard for role-based access control. ACM TISSEC, 4(3):224--274, 2001.
[6]
G. R. Ganger. Generating representative synthetic workloads: An unsolved problem. In International CMG Conference, pages 1263--1269, Dec 1995.
[7]
S. Garfinkel, G. Spafford, and A. Schwartz. Practical UNIX and Internet Security. NIST special publication: Computer security. O'Reilly Media, 2003.
[8]
W. C. Garrison III, A. J. Lee, and T. L. Hinrichs. The design and demonstration of an actor-based, application-aware access control evaluation framework. Technical Report arXiv:1302.1134, Feb 2013.
[9]
W. C. Garrison III, Y. Qiao, and A. J. Lee. On the suitability of dissemination-centric access control systems for group-centric sharing. In CODASPY, 2014.
[10]
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. CACM, 19(8):461--471, Aug 1976.
[11]
Timothy L. Hinrichs et al. Application-sensitive access control evaluation using parameterized expressiveness. In IEEE CSF, June 2013.
[12]
J. Hromkovic. Algorithmics for Hard Problems: Introduction to Combinatorial Optimization, Randomization, Approximation, and Heuristics. Springer-Verlag, Berlin, Heidelberg, 2010.
[13]
V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn. Assessment of Access Control Systems. National Institute of Standards and Technology, 2006.
[14]
Ram Krishnan et al. Group-centric secure information-sharing models for isolated groups. ACM TISSEC, 14(3):23, 2011.
[15]
Ram Krishnan et al. Foundations for group-centric secure information sharing models. In ACM SACMAT, pages 115--124, 2009.
[16]
A. Law. Simulation Modeling and Analysis. McGraw-Hill, 2006.
[17]
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: security analysis in trust management. J. ACM, 52(3):474--514, May 2005.
[18]
T. M. Liggett. Continuous Time Markov Processes: An Introduction. Graduate Studies in Mathematics Series. American Mathematical Society, 2010.
[19]
R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. J. ACM, 24(3):455--464, 1977.
[20]
I. Molloy, P.-C. Cheng, and P. Rohatgi. Trading in risk: using markets to improve access control. In NSPW, 2008.
[21]
S. Osborne, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM TISSEC, 3(2):85--106, May 2000.
[22]
R. Sandhu. Expressive power of the schematic protection model. JCS, 1(1):59--98, 1992.
[23]
Ravi S. Sandhu et al. Role-based access control models. IEEE Computer, 29(2):38--47, 1996.
[24]
R. S. Sandhu and S. Ganta. On testing for absence of rights in access control models. In IEEE CSFW, pages 109--118, 1993.
[25]
M. V. Tripunitara and N. Li. A theory for comparing the expressive power of access control models. JCS, 15(2):231--272, 2007.
[26]
Q. Wang and N. Li. Satis ability and resiliency in work ow authorization systems. ACM TISSEC, 13(4), 2010.
[27]
Dana Zhang et al. RoleVAT: Visual assessment of practical need for role based access control. In ACSAC, pages 13--22, Dec 2009.

Cited By

View all
  • (2023)Dynamic Access Control Through Cryptography in CloudITM Web of Conferences10.1051/itmconf/2023560600156(06001)Online publication date: 9-Aug-2023
  • (2022)Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control SolutionsACM Transactions on Privacy and Security10.1145/356151126:1(1-28)Online publication date: 11-Nov-2022
  • (2022)Research on Zero Trust Access Control Model and Formalization Based on Rail Transit Data Platform2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)10.1109/ICICN56848.2022.10006520(689-695)Online publication date: 23-Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
June 2014
234 pages
ISBN:9781450329392
DOI:10.1145/2613087
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. actor-based simulation
  3. suitability analysis

Qualifiers

  • Research-article

Conference

SACMAT '14
Sponsor:

Acceptance Rates

SACMAT '14 Paper Acceptance Rate 17 of 58 submissions, 29%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Dynamic Access Control Through Cryptography in CloudITM Web of Conferences10.1051/itmconf/2023560600156(06001)Online publication date: 9-Aug-2023
  • (2022)Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control SolutionsACM Transactions on Privacy and Security10.1145/356151126:1(1-28)Online publication date: 11-Nov-2022
  • (2022)Research on Zero Trust Access Control Model and Formalization Based on Rail Transit Data Platform2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN)10.1109/ICICN56848.2022.10006520(689-695)Online publication date: 23-Aug-2022
  • (2021)Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the CloudIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.290816418:2(765-779)Online publication date: 1-Mar-2021
  • (2018)Occam: Software environment for creating reproducible research2018 IEEE 14th International Conference on e-Science (e-Science)10.1109/eScience.2018.00117(394-395)Online publication date: Oct-2018
  • (2016)On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud2016 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2016.54(819-838)Online publication date: May-2016
  • (2015)Decomposing, Comparing, and Synthesizing Access Control Expressiveness SimulationsProceedings of the 2015 IEEE 28th Computer Security Foundations Symposium10.1109/CSF.2015.9(18-32)Online publication date: 13-Jul-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media