Evolutionary Inference of Attribute-Based Access Control Policies

被引:38
|
作者
Medvet, Eric [1 ]
Bartoli, Alberto [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
机构
[1] Univ Trieste, Dipartimento Ingn & Architettura, Trieste, Italy
[2] Univ Insubria, Dipartimento Sci Teor & Applicate, Como, Italy
关键词
D O I
10.1007/978-3-319-15934-8_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The interest in attribute-based access control policies is increasingly growing due to their ability to accommodate the complex security requirements of modern computer systems. With this novel paradigm, access control policies consist of attribute expressions which implicitly describe the properties of subjects and protection objects and which must be satisfied for a request to be allowed. Since specifying a policy in this framework may be very complex, approaches for policy mining, i.e., for inferring a specification automatically from examples in the form of logs of authorized and denied requests, have been recently proposed. In this work, we propose a multi-objective evolutionary approach for solving the policy mining task. We designed and implemented a problem representation suitable for evolutionary computation, along with several search-optimizing features which have proven to be highly useful in this context: a strategy for learning a policy by learning single rules, each one focused on a subset of requests; a custom initialization of the population; a scheme for diversity promotion and for early termination. We show that our approach deals successfully with case studies of realistic complexity.
引用
收藏
页码:351 / 365
页数:15
相关论文
共 50 条
  • [31] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [32] Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents
    Shan, Fangfang
    Wang, Zhenyu
    Liu, Mengyao
    Zhang, Menghan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 3881 - 3902
  • [33] A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies
    Narouei, Masoud
    Takabi, Hassan
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 489 - 506
  • [34] From Static to Dynamic Access Control Policies via Attribute-Based Category Mining
    Bamberger, Anna
    Fernandez, Maribel
    LOGIC-BASED PROGRAM SYNTHESIS AND TRANSFORMATION, LOPSTR 2023, 2023, 14330 : 188 - 197
  • [35] Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework
    Bennett, Phillipa
    Ray, Indrakshi
    France, Robert
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 79 - 97
  • [36] ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations
    Silva, Edelberto Franco
    Muchaluat-Saade, Debora Christina
    Fernandes, Natalia Castro
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1 - 17
  • [37] A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures
    Kotenko, Igor
    Saenko, Igor
    Levshun, Dmitry
    PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19), 2020, 1156 : 165 - 175
  • [38] Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 213 - 215
  • [39] Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
    Manar Alohaly
    Hassan Takabi
    Eduardo Blanco
    Cybersecurity, 2
  • [40] Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
    Alohaly, Manar
    Takabi, Hassan
    Blanco, Eduardo
    CYBERSECURITY, 2019, 2 (01)