The Hardness of Learning Access Control Policies

被引:1
|
作者
Lei, Xiaomeng [1 ]
Tripunitara, Mahesh [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
关键词
Probably approximately correct; Computational hardness; PROTECTION;
D O I
10.1145/3589608.3593840
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of learning access control policies is receiving increasing attention in research. We contribute to the foundations of this problem by posing and addressing meaningful questions on computational hardness. Our work addresses learning access control policies in the context of three different models from the literature: the access matrix, and Role- and Relationship-Based Access Control (RBAC and ReBAC, respectively). Our underlying theory is the well-established notion of Probably Approximately Correct (PAC), with careful extensions for our setting. The data, or examples, a learning algorithm is provided in our setup is that related to access enforcement, which is the process by which a request for access to a resource is decided. For the access matrix, we pose a learning problem that turns out to be computationally easy, and another that we prove is computationally hard. We generalize the former result so we have a sufficient condition for establishing other problems to be computationally easy. With these results as the basis, we consider five learning problems in the context of RBAC, two of which turn out to be computationally hard. Finally, we consider four learning problems in the context of ReBAC, all of which turn out to be computationally easy. Every proof for a problem that is computationally easy is constructive, in that we propose a learning algorithm for the problem that is efficient, and probably, approximately correct. As such, our work makes contributions at the foundations of an important, emerging aspect of access control, and thereby, information security.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [21] Dynamic adaptation of access control policies
    Bharadwaj, V
    Baras, J
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 761 - 766
  • [22] Stratified Abstraction of Access Control Policies
    Backes, John
    Berrueco, Ulises
    Bray, Tyler
    Brim, Daniel
    Cook, Byron
    Gacek, Andrew
    Jhala, Ranjit
    Luckow, Kasper
    McLaughlin, Sean
    Menon, Madhav
    Peebles, Daniel
    Pugalia, Ujjwal
    Rungta, Neha
    Schlesinger, Cole
    Schodde, Adam
    Tanuku, Anvesh
    Varming, Carsten
    Viswanathan, Deepa
    COMPUTER AIDED VERIFICATION (CAV 2020), PT I, 2020, 12224 : 165 - 176
  • [23] The Challenge of Access Control Policies Quality
    Bertino, Elisa
    Abu Jabal, Amani
    Calo, Seraphin
    Verma, Dinesh
    Williams, Christopher
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2018, 10 (02):
  • [24] Verification and enforcement of access control policies
    Cau, Antonio
    Janicke, Helge
    Moszkowski, Ben
    FORMAL METHODS IN SYSTEM DESIGN, 2013, 43 (03) : 450 - 492
  • [25] Management of exceptions on access control policies
    Alfaro, J. G.
    Cuppens, F.
    Cuppens-Boulahia, N.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 97 - +
  • [26] An attribute graph based approach to map local access control policies to credential based access control policies
    Warner, J
    Atluri, V
    Mukkamala, R
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 134 - 147
  • [27] An Obligation Model Bridging Access Control Policies and Privacy Policies
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 133 - 142
  • [28] A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies
    Bui, Thang
    Stoller, Scott D.
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 167 - 178
  • [29] Governance policies for privacy access control and their interactions
    Hassan, W
    Logrippo, L
    FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VIII, 2005, : 114 - 130
  • [30] Typing for Conflict Detection in Access Control Policies
    Adi, Kamel
    Bouzida, Yacine
    Hattak, Ikhlass
    Logrippo, Luigi
    Mankovskii, Serge
    E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 212 - +