Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates

被引:0
|
作者
Decat, Maarten [1 ]
Moeys, Jasper [1 ]
Lagaisse, Bert [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, IMinds DistriNet, B-3001 Leuven, Belgium
关键词
Access control; access control policies; attribute-based access control; reuse; modularity; policy templates;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is key to limiting the actions of users in an application and attribute-based policy languages such as XACML allow to express a wide range of access rules. As these policy languages become more widely used, policies grow both in size and complexity. Modularity and reuse are key to specifying and managing such policies effectively. Ideally, complex or domain-specific policy patterns are defined once and afterwards instantiated by security experts in their application-specific policies. However, current policy languages such as XACML provide only limited features for modularity and reuse. To address this issue, we introduce policy templates as part of a novel attribute-based policy language called STAPL. Policy templates are policies containing unbound variables that can be specified when instantiating the template in another policy later on. STAPL supports four types of policy templates with increasing complexity and expressiveness. This paper illustrates how these policy templates can be used to define reusable policy patterns and validates that policy templates are an effective means to simplify the specification of large and complex attribute-based policies.
引用
收藏
页码:196 / 210
页数:15
相关论文
共 50 条
  • [41] In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control
    Heutelbeck, Dominic
    Baur, Marc Lucas
    Kluba, Martin
    PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 59 - 70
  • [42] An Attribute-Based Access Control using chaincode in RFID systems
    Figueroa, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    Irigoyen, Inigo
    Monterde, Mario
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [43] Attribute-based Encryption for Access Control Using Elementary Operations
    Crampton, Jason
    Pinto, Alexandre
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 125 - 139
  • [44] Attribute-Based Access Control using Combined Authentication Technologies
    Park, Hyun-A
    Lee, Dong Hoon
    Zhan, Justin
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 518 - +
  • [45] Using Attribute-Based Access Control for Remote Healthcare Monitoring
    Ray, Indrakshi
    Alangot, Bithin
    Nair, Shilpa
    Achuthan, Krishnashree
    2017 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2017, : 137 - 142
  • [46] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
    LeMay, Michael
    Fatemieh, Omid
    Gunter, Carl A.
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214
  • [47] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [48] Policy Adaptation in Attribute-Based Access Control for Inter-organizational Collaboration
    Das, Saptarshi
    Sural, Sharnik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 136 - 145
  • [49] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [50] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623