The Hardness of Learning Access Control Policies

被引:1
|
作者
Lei, Xiaomeng [1 ]
Tripunitara, Mahesh [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
关键词
Probably approximately correct; Computational hardness; PROTECTION;
D O I
10.1145/3589608.3593840
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of learning access control policies is receiving increasing attention in research. We contribute to the foundations of this problem by posing and addressing meaningful questions on computational hardness. Our work addresses learning access control policies in the context of three different models from the literature: the access matrix, and Role- and Relationship-Based Access Control (RBAC and ReBAC, respectively). Our underlying theory is the well-established notion of Probably Approximately Correct (PAC), with careful extensions for our setting. The data, or examples, a learning algorithm is provided in our setup is that related to access enforcement, which is the process by which a request for access to a resource is decided. For the access matrix, we pose a learning problem that turns out to be computationally easy, and another that we prove is computationally hard. We generalize the former result so we have a sufficient condition for establishing other problems to be computationally easy. With these results as the basis, we consider five learning problems in the context of RBAC, two of which turn out to be computationally hard. Finally, we consider four learning problems in the context of ReBAC, all of which turn out to be computationally easy. Every proof for a problem that is computationally easy is constructive, in that we propose a learning algorithm for the problem that is efficient, and probably, approximately correct. As such, our work makes contributions at the foundations of an important, emerging aspect of access control, and thereby, information security.
引用
收藏
页码:133 / 144
页数:12
相关论文
共 50 条
  • [41] Specification of access control policies for web services
    Liu, Miao
    Zhang, Wei
    Liu, Huai-Liang
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 472 - 475
  • [42] Rewriting-Based Access Control Policies
    de Oliveira, Anderson Santana
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 171 (04) : 59 - 72
  • [43] Automatically Reducing Privilege for Access Control Policies
    D'Antoni, Loris
    Ding, Shuo
    Goel, Amit
    Ramesh, Mathangi
    Rungta, Neha
    Sung, Chungha
    Proceedings of the ACM on Programming Languages, 2024, 8 (OOPSLA2)
  • [44] Rewrite Based Specification of Access Control Policies
    Cirstea, Horatiu
    Moreau, Pierre-Etienne
    de Oliveira, Anderson Santana
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 234 (0C) : 37 - 54
  • [45] Negotiation of access control policies - (Transcript of discussion)
    Gligor, VD
    SECURITY PROTOCOLS, 2002, 2467 : 202 - 212
  • [46] Signature and access control policies for XML documents
    Bertino, E
    Ferrari, E
    Provenza, LP
    COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 1 - 22
  • [47] Detecting Inconsistency and Incompleteness in Access Control Policies
    Zhang, Hongbin
    Ma, Pengcheng
    Wang, Meihua
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 731 - 739
  • [48] Representing Access Control Policies in Use Cases
    Alghathbar, Khaled
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (03) : 268 - 275
  • [49] On the Decidability of the Safety Problem for Access Control Policies
    Kleiner, E.
    Newcomb, T.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 185 : 107 - 120
  • [50] Extending Mandatory Access Control Policies in Android
    Paraboschi, Stefano
    Bacis, Enrico
    Mutti, Simone
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 21 - 35