Attribute-based lightweight reconfigurable access control policy
Papers|更新时间:2024-06-05
|
Attribute-based lightweight reconfigurable access control policy
Journal on CommunicationsVol. 41, Issue 2, Pages: 112-122(2020)
作者机构:
1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
2. 北京电子科技学院电子与通信工程系,北京 100070
3. 中国科学院信息工程研究所,北京 100093
作者简介:
基金信息:
The National Key Research Project and Development Program of China(2017YFB0802705);The National Key Research and Development Program of China(2016QY06X1203);The National Natural Science Foundation of China(61672515)
Aiming at the severe challenges of access control policy redundancy and conflict detection
the efficiency of access control policy evaluation in complex network environment
an attribute-based lightweight reconfigurable access control policy was proposed.Taking the attribute-based access control policy as an example
the attribute-based access control policy was divided into multiple disjoint atomic access control rules according to the operation type
subject attribute
object attribute
and environment attribute in the access control policy.Complex access control policies were constructed through atomic access control rules and an algebraic expression formed by AND
OR logical relationships.A method for redundancy and collision detection of atomic access control rules was proposed.A method was proposed for decompose a complex access control policy into equivalent atomic access control rules and an algebraic expression.The method for redundancy and collision detection of complex access control policies were proposed through redundancy and collision detection of equivalent atomic access control rules and algebraic expressions.From time complexity and space complexity
the efficiency of the equivalent transformation access control policy was evaluated.It showes that the reconstruction method for access control policy greatly reduces the number
size and complexity of access control policy
improves the efficiency of access control policy redundancy and collision detection
and the efficiency of access control evaluation.
关键词
Keywords
references
RIBEIRO C , ZUQUETE A , FERREIRA P , et al . SPL:an access control language for security policies and complex constraints [C ] // The Network and Distributed System Security Symposium(NDSS’01) . 2001 : 89 - 107 .
DAMIANOU N , DULAY N , LUPU E , et al . The ponder policy specification language [C ] // The International Workshop on Policies for Distributed Systems and Networks . 2001 : 18 - 38 .
OASIS XACML.eXtensible access control Markup language XACML version 3.0 [S ] . OASIS Standard , 2013 .
RAO P , LIN D , BERTINO E , et al . An algebra for fine-grained integration of XACML policies [C ] // The 14th ACM Symposium on Access Control Models and Technologies (SACMAT’09) . 2009 : 63 - 72 .
SHAHZAD M , . Towards composing access control policies [C ] // IEEE International Conference on Communications (ICC) . 2018 : 1 - 6 .
XU Z , STOLLER S . Mining attribute-based access control policies [J ] . IEEE Transactions on Dependable and Secure Computing , 2015 , 12 ( 5 ): 533 - 545 .
NGO C , DEMCHENKO Y , LAAT DE C . Decision diagrams for XACML policy evaluation and management [J ] . Computers & Security , 2015 , 49 : 1 - 16 .
YAO J , MAO B , XIE L . A DAG-based security policy conflicts detection method [J ] . Journal of Computer Research and Development , 2005 , 42 ( 7 ): 1108 - 1114 .
LI R X , LU J F , LI T Y , et al . An approach for resolving inconsistency conflicts in access control policies [J ] . Chinese Journal of Computers , 2013 , 36 ( 6 ): 1210 - 1223 .
BECKERLE M , MARTUCCI L A . Formal definitions for usable access control rule sets from goals to metrics [C ] // The Ninth Symposium on Usable Privacy and Security (SOUPS) . 2013 : 1 - 11 .
IYER P , MASOUMZADEH A . Mining positive and negative attribute-based access control policy rules [C ] // The 23nd ACM Symposium on Access Control Models and Technologies (SACMAT’18) . 2018 : 161 - 172 .
CHAKRABORTY S , SANDHU R , KRISHNAN R . On the feasibility of attribute-based access control policy mining [C ] // The 20th IEEE Conference on Information Reuse and Integration (IRI) . 2019 : 1 - 8 .
BONATTI P , VIMERCATI S D C , SAMARATI P . An algebra for composing access control policies [J ] . ACM Transactions on Information and System Security (TISSEC) , 2002 , 5 ( 1 ): 1 - 35 .
LUPU E C , SLOMAN M . Conflicts in policy-based distributed systems management [J ] . IEEE Transactions on Software Engineering , 1999 , 25 ( 6 ): 852 - 869 .
ST-MARTIN M , FELTY A P . A verified algorithm for detecting conflicts in XACML access control rules [C ] // The 5th ACM SIGPLAN Conference on Certified Programs and Proofs . 2016 : 166 - 175 .