Polisma - A Framework for Learning Attribute-Based Access Control Policies

被引:28
作者
Abu Jabal, Amani [1 ]
Bertino, Elisa [1 ]
Lobo, Jorge [2 ]
Law, Mark [3 ]
Russo, Alessandra [3 ]
Calo, Seraphin [4 ]
Verma, Dinesh [4 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] ICREA Univ Pompeo Fabra, Barcelona, Spain
[3] Imperial Coll London, London, England
[4] IBM TJ Watson Res Ctr, Yorktown Hts, NY USA
来源
COMPUTER SECURITY - ESORICS 2020, PT I | 2020年 / 12308卷
关键词
Authorization rules; Policy mining; Policy generalization;
D O I
10.1007/978-3-030-58951-6_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-based access control (ABAC) is being widely adopted due to its flexibility and universality in capturing authorizations in terms of the properties (attributes) of users and resources. However, specifying ABAC policies is a complex task due to the variety of such attributes. Moreover, migrating an access control system adopting a low-level model to ABAC can be challenging. An approach for generating ABAC policies is to learn them from data, namely from logs of historical access requests and their corresponding decisions. This paper proposes a novel framework for learning ABAC policies from data. The framework, referred to as Polisma, combines data mining, statistical, and machine learning techniques, capitalizing on potential context information obtained from external sources (e.g., LDAP directories) to enhance the learning process. The approach is evaluated empirically using two datasets (real and synthetic). Experimental results show that Polisma is able to generate ABAC policies that accurately control access requests and outperforms existing approaches.
引用
收藏
页码:523 / 544
页数:22
相关论文
共 23 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
Agrawal R., 1994, P VLDB ENDOWMENT, P487
[3]  
AuthZForce, about us
[4]  
balenciaga, US
[5]   Access Control for Databases: Concepts and Systems [J].
Bertino, Elisa ;
Ghinita, Gabriel ;
Kamra, Ashish .
FOUNDATIONS AND TRENDS IN DATABASES, 2010, 3 (1-2) :1-148
[6]  
Cappelletti L, 2019, IEEE INT CONF BIG DA, P4000, DOI 10.1109/BigData47090.2019.9005959
[7]   Mining ABAC Rules from Sparse Logs [J].
Cotrini, Carlos ;
Weghorn, Thilo ;
Basin, David .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, :31-46
[8]  
De Raedt L, 2015, PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), P1835
[9]  
Hu V., 2017, Guide to attribute based access control
[10]  
Karimi L, 2018, IEEE INT CONF BIG DA, P1427, DOI 10.1109/BigData.2018.8622037