A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies

被引:15
作者
Bui, Thang [1 ]
Stoller, Scott D. [1 ]
机构
[1] SUNY Stony Brook, Stony Brook, NY 11794 USA
来源
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES | 2020年
关键词
security policy mining; attribute-based access control; relationship-based access control; decision trees;
D O I
10.1145/3381991.3395619
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing, by allowing policies to be expressed in terms of chains of relationships between entities. ReBAC policy mining algorithms have the potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC policy. This paper presents new algorithms, called DTRM (Decision Tree ReBAC Miner) and DTRM-, based on decision trees, for mining ReBAC policies from access control lists (ACLs) and information about entities. Compared to state-of-the-art ReBAC mining algorithms, our algorithms are significantly faster, achieve comparable policy quality, and can mine policies in a richer language.
引用
收藏
页码:167 / 178
页数:12
相关论文
共 30 条
[1]   A Deep Learning Approach for Extracting Attributes of ABAC Policies [J].
Alohaly, Manar ;
Takabi, Hassan ;
Blanco, Eduardo .
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, :137-148
[2]  
Beckerle Matthias., 2013, Proceedings of the Ninth Symposium on Usable Privacy and Security, page, P2
[3]  
Bogaerts Jasper., 2015, P 31 ANN COMP SEC AP, P291, DOI 10.1145/2818000.2818009
[4]  
Breiman L, 1984, Classification and Regression Trees, V1st, DOI DOI 10.1201/9781315139470
[5]  
Bui T, 2020, Arxiv, DOI arXiv:1909.12095
[6]   Efficient and Extensible Policy Mining for Relationship-Based Access Control [J].
Bui, Thang ;
Stoller, Scott D. ;
Le, Hieu .
PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, :161-172
[7]   Greedy and evolutionary algorithms for mining relationship-based access control policies [J].
Bui, Thang ;
Stoller, Scott D. ;
Li, Jiajie .
COMPUTERS & SECURITY, 2019, 80 :317-333
[8]  
Bui Thang, 2018, LECT NOTES COMPUTER, V1358
[9]  
Cheng Y, 2012, LECT NOTES COMPUT SC, V7371, P8, DOI 10.1007/978-3-642-31540-4_2
[10]   The Next 700 Policy Miners: A Universal Method for Building Policy Miners [J].
Cotrini, Carlos ;
Corinzia, Luca ;
Weghorn, Thilo ;
Basin, David .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :95-112