An Algorithm for Compression of XACML Access Control Policy Sets by Recursive Subsumption

被引:4
作者
Stepien, Bernard [1 ]
Matwin, Stan [1 ]
Felty, Amy [1 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON, Canada
来源
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES) | 2012年
关键词
access control; subsumption algorithm; XACML;
D O I
10.1109/ARES.2012.38
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Policy administrators increasingly face the challenge of managing large policy bases, and this need becomes more acute with the growing importance of fine-grained access control models, e. g. ABAC. We have shown in previous work that simple policies mostly based on conjunctions of single attribute conditions, can be merged into more complex conditions composed of combinations of conjunctions and disjunctions of attribute/value pairs. Here, we propose an algorithm that uses a recursive process of subsumption applied on the original set of policies that results in a complex and short policy, often significantly compressing the original policy. We present this algorithm, and discuss the advantages of this approach, i.e. its performance when working on the policy structures encountered in real-life policy sets, its scalability, and its ability to deal with large alphabet sets.
引用
收藏
页码:161 / 167
页数:7
相关论文
共 16 条
[1]  
Anderson A., U.S. patent, Patent No. 20100042973
[2]  
[Anonymous], 1992, 15 NAT COMP SEC C
[3]  
[Anonymous], 2007, P 16 INT C WORLD WID
[4]  
Barker S., 2003, ACM Transactions on Information and Systems Security, V6, P501, DOI 10.1145/950191.950194
[5]  
BATOUBA R, 2007, IEEE T NETWORK SERVI, V4
[6]  
Bertot Yves., INTERACTIVE THEOREM
[7]  
Capretta V., FMSE 07 P, P22
[8]  
Dougherty DJ, 2006, LECT NOTES ARTIF INT, V4130, P632
[9]  
Karp A.H., 2009, HPL200930
[10]   Adding Attributes to Role-Based Access Control [J].
Kuhn, D. Richard ;
Coyne, Edward J. ;
Weil, Timothy R. .
COMPUTER, 2010, 43 (06) :79-81