Policy Evaluation and Dynamic Management Based on Matching Tree for XACML

被引:4
作者
Kang, Hongzhaoning [1 ]
Gang, Liu [1 ]
Wang, Quan [1 ]
Zhang, Runnan [1 ]
Zhong, Zichao [1 ]
Tian, Yumin [1 ]
机构
[1] XIDIAN Univ, Comp Sci & Technol, Xian, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
XACML; access control policy; matching tree; dynamic management; DISTRIBUTED ENVIRONMENTS; ACCESS-CONTROL;
D O I
10.1109/TrustCom50675.2020.00209
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a widely recognized policy language of access control, the eXtensible Access Control Markup Language (XACML) is widely used with its fine-grained and easy-to-read. With the application of XACML, researchers find that the XACML based policy evaluation and policy management methods can no longer meet the current large-scale requests for efficient access and dynamic management requirements. To improve the performance of policy evaluation based on XACML, we propose a policy evaluation method based on the matching tree to search policy efficiently and avoid the extra consumption of invalid policy participation. Furthermore, we propose a policy dynamic management method based on the matching tree to reduce the scale of the policy to be disabled for management, by adding locks in the tree node and the information mapping table. Through theoretical derivation and the factors that may affect its evaluation performance, we verify the improvement of evaluation efficiency. The simulation also shows the improvement of the evaluation engine based on the matching tree compared with OpenAz.
引用
收藏
页码:1530 / 1535
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2013, OASIS STANDARD, V22
[2]   A metamodel of access control for distributed environments: Applications and properties [J].
Bertolissi, Clara ;
Fernandez, Maribel .
INFORMATION AND COMPUTATION, 2014, 238 :187-207
[3]   Establishment of attribute bitmaps for efficient XACML policy evaluation [J].
Deng, Fan ;
Wang, Shiyu ;
Zhang, Liyong ;
Wei, Xiaoqian ;
Yu, Jingping .
KNOWLEDGE-BASED SYSTEMS, 2018, 143 :93-101
[4]   Managing XACML systems in distributed environments through Meta-Policies [J].
Diaz-Lopez, Daniel ;
Dolera-Tormo, Gines ;
Gomez-Marmol, Felix ;
Martinez-Perez, Gregorio .
COMPUTERS & SECURITY, 2015, 48 :92-115
[5]  
Godik T. M. Simon, 2003, OASIS STANDARD
[6]   Designing Fast and Scalable XACML Policy Evaluation Engines [J].
Liu, Alex X. ;
Chen, Fei ;
Hwang, JeeHyun ;
Xie, Tao .
IEEE TRANSACTIONS ON COMPUTERS, 2011, 60 (12) :1802-1817
[7]   A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies [J].
Margheri, Andrea ;
Masi, Massimiliano ;
Pugliese, Rosario ;
Tiezzi, Francesco .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (01) :2-33
[8]   Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation [J].
Marouf, Said ;
Shehab, Mohamed ;
Squicciarini, Anna ;
Sundareswaran, Smitha .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2011, 4 (04) :300-313
[9]   SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services [J].
Mourad, Azzam ;
Jebbaoui, Hussein .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (01) :165-178
[10]  
Pina Ros S., 2012, Proceedings of the 2012 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, USA, June 20-22, 2012, P83