Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates

被引:0
|
作者
Decat, Maarten [1 ]
Moeys, Jasper [1 ]
Lagaisse, Bert [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, IMinds DistriNet, B-3001 Leuven, Belgium
关键词
Access control; access control policies; attribute-based access control; reuse; modularity; policy templates;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is key to limiting the actions of users in an application and attribute-based policy languages such as XACML allow to express a wide range of access rules. As these policy languages become more widely used, policies grow both in size and complexity. Modularity and reuse are key to specifying and managing such policies effectively. Ideally, complex or domain-specific policy patterns are defined once and afterwards instantiated by security experts in their application-specific policies. However, current policy languages such as XACML provide only limited features for modularity and reuse. To address this issue, we introduce policy templates as part of a novel attribute-based policy language called STAPL. Policy templates are policies containing unbound variables that can be specified when instantiating the template in another policy later on. STAPL supports four types of policy templates with increasing complexity and expressiveness. This paper illustrates how these policy templates can be used to define reusable policy patterns and validates that policy templates are an effective means to simplify the specification of large and complex attribute-based policies.
引用
收藏
页码:196 / 210
页数:15
相关论文
共 50 条
  • [1] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [2] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [3] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [4] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
  • [5] Evolutionary Inference of Attribute-Based Access Control Policies
    Medvet, Eric
    Bartoli, Alberto
    Carminati, Barbara
    Ferrari, Elena
    EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
  • [6] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [7] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [8] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [9] Towards Attribute-Based Access Control Policy Engineering Using Risk
    Krautsevich, Leanid
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Yautsiukhin, Artsiom
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 80 - 90
  • [10] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252