The Secrecy Resilience of Access Control Policies and Its Application to Role Mining

被引:3
作者
Guo, Qiang [1 ,3 ]
Tripunitara, Mahesh [2 ]
机构
[1] BMO Financial Grp, Toronto, ON, Canada
[2] Univ Waterloo, ECE, Waterloo, ON, Canada
[3] Univ Waterloo, Waterloo, ON, Canada
来源
PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022 | 2022年
关键词
secrecy resilience; role-based access control; role mining;
D O I
10.1145/3532105.3535030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a notion that we call the secrecy resilience of an access control policy that, to our knowledge, has not been explored in prior work. We seek to capture with this notion the property inherent to an access control policy that measures its resistance to disclosure. We motivate and then propose a definition for secrecy resilience that is based on the notion of entropy from information theory. We focus on policies expressed in Role-Based Access Control (RBAC), and contrast RBAC from the access matrix from the standpoint of secrecy resilience. We observe that similar to other objectives such as the minimization of the number of roles, an RBAC policy with the best secrecy resilience can be a desirable objective of bottom-up role-mining, with which we seek to compute an RBAC policy given as input an access matrix. We have carried out an empirical assessment of several role-mining algorithms from the standpoint of secrecy resilience for two underlying distribution-events pairs each of which captures a kind of best-case from the standpoint of a defender. Towards carrying out the empirical assessment, we make an additional contribution to role-mining: we propose new reductions for the two problems of minimizing the number of roles and the number of edges, and discuss the manner in which our reductions are superior to reductions in existing work.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 22 条
[1]  
Anderer Simon, 2021, P 26 ACM S ACC CONTR
[2]  
Cover T.M., 2006, Elements of information theory. Wiley series in telecommunications and signal processing
[3]  
Een N., MINISAT PAGE
[4]  
Ene A, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P1
[5]   Role Mining with Probabilistic Models [J].
Frank, Mario ;
Buhman, Joachim M. ;
Basin, David .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 15 (04)
[6]  
Goldwasser S., 1982, P 14 ANN ACM S THEOR, P365, DOI DOI 10.1145/800070.802212
[7]  
Griffiths P. P., 1976, ACM Transactions on Database Systems, V1, P242, DOI 10.1145/320473.320482
[8]  
Gurobi, Gurobi optimizer
[9]  
Katz Jonathan., 2014, INTRO MODERN CRYPTOG, VSecond
[10]   The Traust authorization service [J].
Lee, Adam J. ;
Winslett, Marianne ;
Basney, Jim ;
Welch, Von .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (01)