Detecting and Resolving Policy Misconfigurations in Access-Control Systems

被引:44
|
作者
Bauer, Lujo [1 ]
Garriss, Scott [2 ]
Reiter, Michael K. [3 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Google, Mountain View, CA 94043 USA
[3] Univ N Carolina, Dept Comp Sci, Chapel Hill, NC 27599 USA
关键词
Experimentation; Human Factors; Security; Access control; policy inference; machine learning;
D O I
10.1145/1952982.1952984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration, and, in the context of particular applications (e. g., health care), very severe consequences. In this article we apply association rule mining to the history of accesses to predict changes to access-control policies that are likely to be consistent with users' intentions, so that these changes can be instituted in advance of misconfigurations interfering with legitimate accesses. Instituting these changes requires the consent of the appropriate administrator, of course, and so a primary contribution of our work is how to automatically determine from whom to seek consent and how to minimize the costs of doing so. We show using data from a deployed access-control system that our methods can reduce the number of accesses that would have incurred costly time-of-access delays by 43%, and can correctly predict 58% of the intended policy. These gains are achieved without impacting the total amount of time users spend interacting with the system.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Detecting and Resolving Policy Misconfigurations in Access-Control Systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 185 - 194
  • [2] Detecting and Resolving Misconfigurations in Role-Based Access Control
    Mukkamala, Ravi
    Kamisetty, Vishnu
    Yedugani, Pawankumar
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 318 - 325
  • [3] SPECIFYING DISCRETIONARY ACCESS-CONTROL POLICY FOR DISTRIBUTED SYSTEMS
    MOFFETT, J
    SLOMAN, M
    TWIDLE, K
    COMPUTER COMMUNICATIONS, 1990, 13 (09) : 571 - 580
  • [4] ACCESS-CONTROL SYSTEMS FOR SECURITY
    MENKUS, B
    OFFICE ADMINISTRATION AND AUTOMATION, 1984, 45 (04): : 57 - &
  • [5] Distributed proving in access-control systems
    Bauer, L
    Gartiss, S
    Reiter, MK
    2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 81 - 95
  • [6] ACCESS-CONTROL FOR COMPUTER-SYSTEMS
    FARQUHAR, W
    INFORMATION AGE, 1985, 7 (01): : 25 - 29
  • [7] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [8] SMART CARD AND ACCESS-CONTROL SYSTEMS
    LEMARCHANT, P
    ACTA ELECTRONICA, 1983, 25 (01): : 93 - 98
  • [9] A DEFINITION OF AN ACCESS-CONTROL SYSTEMS LANGUAGE
    EMMS, J
    COMPUTER STANDARDS & INTERFACES, 1987, 6 (04) : 443 - 454
  • [10] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23