The Hardness of Learning Access Control Policies

被引:1
|
作者
Lei, Xiaomeng [1 ]
Tripunitara, Mahesh [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
关键词
Probably approximately correct; Computational hardness; PROTECTION;
D O I
10.1145/3589608.3593840
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of learning access control policies is receiving increasing attention in research. We contribute to the foundations of this problem by posing and addressing meaningful questions on computational hardness. Our work addresses learning access control policies in the context of three different models from the literature: the access matrix, and Role- and Relationship-Based Access Control (RBAC and ReBAC, respectively). Our underlying theory is the well-established notion of Probably Approximately Correct (PAC), with careful extensions for our setting. The data, or examples, a learning algorithm is provided in our setup is that related to access enforcement, which is the process by which a request for access to a resource is decided. For the access matrix, we pose a learning problem that turns out to be computationally easy, and another that we prove is computationally hard. We generalize the former result so we have a sufficient condition for establishing other problems to be computationally easy. With these results as the basis, we consider five learning problems in the context of RBAC, two of which turn out to be computationally hard. Finally, we consider four learning problems in the context of ReBAC, all of which turn out to be computationally easy. Every proof for a problem that is computationally easy is constructive, in that we propose a learning algorithm for the problem that is efficient, and probably, approximately correct. As such, our work makes contributions at the foundations of an important, emerging aspect of access control, and thereby, information security.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [1] Active Learning of Relationship-Based Access Control Policies
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 155 - 166
  • [2] Towards Automated Learning of Access Control Policies Enforced by Web Applications
    Iyer, Padmavathi
    Masoumzadeh, Amir
    PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 163 - 168
  • [3] Polisma - A Framework for Learning Attribute-Based Access Control Policies
    Abu Jabal, Amani
    Bertino, Elisa
    Lobo, Jorge
    Law, Mark
    Russo, Alessandra
    Calo, Seraphin
    Verma, Dinesh
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
  • [4] Resiliency Policies in Access Control
    Li, Ninghui
    Wang, Qihua
    Tripunitara, Mahesh
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)
  • [5] On the negotiation of access control policies
    Gligor, VD
    Khurana, H
    Koleva, RK
    Bharadwaj, VG
    Baras, JS
    SECURITY PROTOCOLS, 2002, 2467 : 188 - 201
  • [6] Optimization of Access Control Policies
    Kern, Sascha
    Baumer, Thomas
    Groll, Sebastian
    Fuchs, Ludwig
    Pernul, Guenther
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [7] Access control policies and languages
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Samarati, Pierangela
    Jajodia, Sushil
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2007, 3 (02) : 94 - 102
  • [8] An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies
    Karimi, Leila
    Joshi, James
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1427 - 1436
  • [9] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [10] Privacy Policies Model in Access Control
    Werner, Jorge
    Westphall, Carla Merkle
    Vargas, Andre Azevedo
    Westphall, Carlos Becker
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,