A Datalog Framework for Modeling Relationship-based Access Control Policies

被引:21
|
作者
Pasarella, Edelmira [1 ]
Lobo, Jorge [2 ]
机构
[1] Univ Politecn Cataluna, Comp Sci Dept, Barcelona, Spain
[2] Univ Pompeu Fabra, Inst Catalana Recerca & Estudis Avancats ICREA, Barcelona, Spain
来源
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17) | 2017年
关键词
Relationship-based Access Control; security and privacy policies; Datalog; EXPRESSIVE POWER; COMPLEXITY;
D O I
10.1145/3078861.3078871
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Relationships like friendship to limit access to resources have been part of social network applications since their beginnings. Describing access control policies in terms of relationships is not particular to social networks and it arises naturally in many situations. Hence, we have recently seen several proposals formalizing different Relationship-based Access Control (ReBAC) models. In this paper, we introduce a class of Datalog programs suitable for modeling ReBAC and argue that this class of programs, that we called ReBAC Datalog policies, provides a very general framework to specify and implement ReBAC policies. To support our claim, we first formalize the merging of two recent proposals for modeling ReBAC, one based on hybrid logic and the other one based on path regular expressions. We present extensions to handle negative authorizations and temporal policies. We describe mechanism for policy analysis, and then discuss the feasibility of using Datalog-based systems as implementations.
引用
收藏
页码:91 / 102
页数:12
相关论文
共 28 条
  • [1] Security Analysis of Relationship-Based Access Control Policies
    Masoumzadeh, Amirreza
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
  • [2] Active Learning of Relationship-Based Access Control Policies
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 155 - 166
  • [3] Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 135 - 140
  • [4] Greedy and evolutionary algorithms for mining relationship-based access control policies
    Bui, Thang
    Stoller, Scott D.
    Li, Jiajie
    COMPUTERS & SECURITY, 2019, 80 : 317 - 333
  • [5] A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies
    Bui, Thang
    Stoller, Scott D.
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 167 - 178
  • [6] Learning Relationship-Based Access Control Policies from Black-Box Systems
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (03)
  • [7] Efficient and Extensible Policy Mining for Relationship-Based Access Control
    Bui, Thang
    Stoller, Scott D.
    Le, Hieu
    PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 161 - 172
  • [8] Effective Evaluation of Relationship-Based Access Control Policy Mining
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 127 - 138
  • [9] Poster: A Flexible Relationship-Based Access Control Policy Generator
    Clark, Stanley
    Yakovets, Nikolay
    Fletcher, George H. L.
    Zannone, Nicola
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 263 - 265
  • [10] Attributes Aware Relationship-based Access Control for Smart IoT Systems
    Praharaj, Lopamudra
    Ameer, Safwa
    Gupta, Maanak
    Sandhu, Ravi
    2022 IEEE 8TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING, CIC, 2022, : 72 - 81