Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems

被引:6
作者
Mell, Peter [1 ]
Shook, James M. [1 ]
Gavrila, Serban [1 ]
机构
[1] NIST, 100 Bur Dr, Gaithersburg, MD 20899 USA
来源
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS | 2016年
关键词
ABAC; access control; algorithms; complexity; computer security; graph theory; insider; NIST; NGAC; Policy Machine; simultaneous instantiation; XaCML;
D O I
10.1145/2995959.2995961
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The American National Standards Institute (ANSI) has standardized an access control approach, Next Generation Access Control (NGAC), that enables simultaneous instantiation of multiple access control policies. For large complex enterprises this is critical to limiting the authorized access of insiders. However, the specifications describe the required access control capabilities but not the related algorithms. While appropriate, this leave open the important question as to whether or not NGAC is scalable. Existing cubic reference implementations indicate that it does not. For example, the primary NGAC reference implementation took several minutes to simply display the set of files accessible to a user on a moderately sized system. To solve this problem we provide an efficient access control decision algorithm, reducing the overall complexity from cubic to linear. Our other major contribution is to provide a novel mechanism for administrators and users to review allowed access rights. We provide an interface that appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. These capabilities help limit insider access to information (and thereby limit information leakage) by enabling the efficient simultaneous instantiation of multiple access control policies.
引用
收藏
页码:13 / 21
页数:9
相关论文
共 19 条
  • [1] [Anonymous], 2001, CAMBRIDGE STUDIES AD
  • [2] ANSI, 2004, AM NAT STAND INF TEC
  • [3] ANSI, 2013, AM NAT STAND INF TEC
  • [4] ANSI, 2016, AM NAT STAND INF TEC
  • [5] Belyaev K., 2015, TINYPM PROTOTYPE
  • [6] Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy
    Biswas, Prosunjit
    Sandhu, Ravi
    Krishnan, Ram
    [J]. ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, : 1 - 12
  • [7] Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295
  • [8] Fatih Turkmen B C., 2008, SWS '08 Proceedings of the 2008 ACM workshop on Secure web services, P37
  • [9] Ferraiolo D., 7987 NISTIR
  • [10] The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
    Ferraiolo, David
    Atluri, Vijayalakshmi
    Gavrila, Serban
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (04) : 412 - 424