The Hardness of Learning Access Control Policies

被引:1
|
作者
Lei, Xiaomeng [1 ]
Tripunitara, Mahesh [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
关键词
Probably approximately correct; Computational hardness; PROTECTION;
D O I
10.1145/3589608.3593840
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of learning access control policies is receiving increasing attention in research. We contribute to the foundations of this problem by posing and addressing meaningful questions on computational hardness. Our work addresses learning access control policies in the context of three different models from the literature: the access matrix, and Role- and Relationship-Based Access Control (RBAC and ReBAC, respectively). Our underlying theory is the well-established notion of Probably Approximately Correct (PAC), with careful extensions for our setting. The data, or examples, a learning algorithm is provided in our setup is that related to access enforcement, which is the process by which a request for access to a resource is decided. For the access matrix, we pose a learning problem that turns out to be computationally easy, and another that we prove is computationally hard. We generalize the former result so we have a sufficient condition for establishing other problems to be computationally easy. With these results as the basis, we consider five learning problems in the context of RBAC, two of which turn out to be computationally hard. Finally, we consider four learning problems in the context of ReBAC, all of which turn out to be computationally easy. Every proof for a problem that is computationally easy is constructive, in that we propose a learning algorithm for the problem that is efficient, and probably, approximately correct. As such, our work makes contributions at the foundations of an important, emerging aspect of access control, and thereby, information security.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [31] Conformance Checking of Dynamic Access Control Policies
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 227 - 242
  • [32] Composing access control policies of distributed components
    Tilak, Omkar J.
    Raje, Rajeev R.
    Zou, Xukai
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 301 - +
  • [33] A framework for automated negotiation of access control policies
    Bharadwaj, VG
    Baras, JS
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 216 - 221
  • [34] On the Incoherencies in Web Browser Access Control Policies
    Singh, Kapil
    Moshchuk, Alexander
    Wang, Helen J.
    Lee, Wenke
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 463 - 478
  • [35] Distributed access control policies for spectrum sharing
    Baldini, Gianmarco
    Fovino, Igor Nai
    Braghin, Stefano
    Trombetta, Alberto
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 925 - 935
  • [36] Adaptive Access Control Policies for IoT Deployments
    Alkhresheh, Ashraf
    Elgazzar, Khalid
    Hassanein, Hossam S.
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 377 - 383
  • [37] Data Sharing in Presence of Access Control Policies
    Agoun, Juba
    Hacid, Mohand-Said
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 301 - 309
  • [38] Aggregating and deploying network access control policies
    Alfaro, Joaquin G.
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 532 - +
  • [39] Algebraic Model for Handling Access Control Policies
    Sabri, Khair Eddin
    Hiary, Hazem
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 653 - 657
  • [40] Oblivious Transfer with Hidden Access Control Policies
    Camenisch, Jan
    Dubovitskaya, Maria
    Neven, Gregory
    Zaverucha, Gregory M.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +