Evolutionary Inference of Attribute-Based Access Control Policies

被引:38
|
作者
Medvet, Eric [1 ]
Bartoli, Alberto [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
机构
[1] Univ Trieste, Dipartimento Ingn & Architettura, Trieste, Italy
[2] Univ Insubria, Dipartimento Sci Teor & Applicate, Como, Italy
关键词
D O I
10.1007/978-3-319-15934-8_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The interest in attribute-based access control policies is increasingly growing due to their ability to accommodate the complex security requirements of modern computer systems. With this novel paradigm, access control policies consist of attribute expressions which implicitly describe the properties of subjects and protection objects and which must be satisfied for a request to be allowed. Since specifying a policy in this framework may be very complex, approaches for policy mining, i.e., for inferring a specification automatically from examples in the form of logs of authorized and denied requests, have been recently proposed. In this work, we propose a multi-objective evolutionary approach for solving the policy mining task. We designed and implemented a problem representation suitable for evolutionary computation, along with several search-optimizing features which have proven to be highly useful in this context: a strategy for learning a policy by learning single rules, each one focused on a subset of requests; a custom initialization of the population; a scheme for diversity promotion and for early termination. We show that our approach deals successfully with case studies of realistic complexity.
引用
收藏
页码:351 / 365
页数:15
相关论文
共 50 条
  • [41] An Attribute-based Access Control with Flexible Attribute Change in Open Systems
    Ye, Tao
    Cai, Yongquan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT 2017), 2017, 70 : 101 - 105
  • [42] Enabling Attribute-Based Access Control in NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 208 - 223
  • [43] Anonymity in Attribute-Based Access Control: Framework and Metric
    Zhang, Runnan
    Liu, Gang
    Kang, Hongzhaoning
    Wang, Quan
    Wan, Bo
    Luo, Nan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 463 - 475
  • [44] A New Attribute-Based Access Control Model for RDBMS
    Al-Saraireh, Jaafer
    Hassan, Majid
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (04) : 3 - 22
  • [45] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [46] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [47] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [48] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [49] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
  • [50] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226