Resilient Delegation Revocation with Precedence for Predecessors is NP-Complete

被引:1
|
作者
Cramer, Marcos [1 ]
Van Hertum, Pieter [2 ]
Lapauw, Ruben [2 ]
Dasseville, Ingmar [2 ]
Denecker, Marc [2 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
[2] Katholieke Univ Leuven, Leuven, Belgium
来源
2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016) | 2016年
关键词
access control; delegation; revocation; resilience; negative authorization; denial; predecessor takes precedence; complexity;
D O I
10.1109/CSF.2016.37
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these delegation chains when revoking rights, which give rise to different revocation schemes. One possibility studied in the literature is to revoke rights by issuing negative authorizations, meant to ensure that the revocation is resilient to a later reissuing of the rights, and to resolve conflicts between principals by giving precedence to predecessors, i.e. principals that come earlier in the delegation chain. However, the effects of negative authorizations have been defined differently by different authors. Having identified three definitions of this effect from the literature, the first contribution of this paper is to point out that two of these three definitions pose a security threat. However, avoiding this security threat comes at a price: We prove that with the safe definition of the effect of negative authorizations, deciding whether a principal does have access to a resource is an NP-complete decision problem. We discuss two limitations that can be imposed on an access-control system in order to reduce the complexity of the problem back to a polynomial complexity: Limiting the length of delegation chains to an integer m reduces the runtime complexity of determining access to O(n(m)), and requiring that principals form a hierarchy that graph-theoretically forms a rooted tree makes this decision problem solvable in quadratic runtime. Finally we discuss an approach that can mitigate the complexity problem in practice without fully getting rid of NP-completeness.
引用
收藏
页码:432 / 442
页数:11
相关论文
共 24 条
  • [1] Hamiltonian index is NP-complete
    Ryjacek, Zdenek
    Woeginger, Gerhard J.
    Xiong, Liming
    DISCRETE APPLIED MATHEMATICS, 2011, 159 (04) : 246 - 250
  • [2] Lambek calculus is NP-complete
    Pentus, Mati
    THEORETICAL COMPUTER SCIENCE, 2006, 357 (1-3) : 186 - 201
  • [3] An NP-complete fragment of LTL
    Muscholl, A
    Walukiewicz, I
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2005, 16 (04) : 743 - 753
  • [4] Universal solutions for NP-complete problems
    Portier, N
    THEORETICAL COMPUTER SCIENCE, 1998, 201 (1-2) : 137 - 150
  • [5] Border Basis Detection is NP-complete
    Ananth, Prabhanjan V.
    Dukkipati, Ambedkar
    ISSAC 2011: PROCEEDINGS OF THE 36TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION, 2011, : 11 - 18
  • [6] The transposition median problem is NP-complete
    Bader, Martin
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (12-14) : 1099 - 1110
  • [7] Optimal Jacobian accumulation is NP-complete
    Naumann, Uwe
    MATHEMATICAL PROGRAMMING, 2008, 112 (02) : 427 - 441
  • [8] Optimal Jacobian accumulation is NP-complete
    Uwe Naumann
    Mathematical Programming, 2008, 112 : 427 - 441
  • [9] The monotone Lambek calculus is NP-complete
    Pentus, Mati
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8222 : 368 - 380
  • [10] The maximum edge biclique problem is NP-complete
    Peeters, R
    DISCRETE APPLIED MATHEMATICS, 2003, 131 (03) : 651 - 654