Proceedings of the 19th ACM Symposium on Access Control Models and Technologies 2014
DOI: 10.1145/2613087.2613099
|View full text |Cite
|
Sign up to set email alerts
|

An actor-based, application-aware access control evaluation framework

Abstract: To date, most work regarding the formal analysis of access control schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property that exists in an absolute sense, detached from the application context within which an access control scheme will ultimately be deployed. By contrast, we formalize the access control suitability analysis problem, which seeks to evaluate the degree to which a set of candidate access control schemes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…We now describe our evaluation of the suitability of IBE/IBS and PKI constructions for enforcing RBAC 0 access controls. We utilize a workflow similar to that proposed in [28], in which we first evaluate the candidates' expressive power (i.e., ability to represent the desired policy as it evolves), then evaluate the cost of using each candidate using Monte Carlo simulation based on initial states obtained from real-world datasets. addU (u) -Add u to USERS -Generate IBE private key ku ← KeyGen IBE (u) and IBS private key su ← KeyGen IBS (u) for the new user u -Give ku and su to u over private and authenticated channel delU (u) -For every role r that u is a member of:…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We now describe our evaluation of the suitability of IBE/IBS and PKI constructions for enforcing RBAC 0 access controls. We utilize a workflow similar to that proposed in [28], in which we first evaluate the candidates' expressive power (i.e., ability to represent the desired policy as it evolves), then evaluate the cost of using each candidate using Monte Carlo simulation based on initial states obtained from real-world datasets. addU (u) -Add u to USERS -Generate IBE private key ku ← KeyGen IBE (u) and IBS private key su ← KeyGen IBS (u) for the new user u -Give ku and su to u over private and authenticated channel delU (u) -For every role r that u is a member of:…”
Section: Discussionmentioning
confidence: 99%
“…To evaluate the costs of using our constructions to enforce RBAC 0 , we utilize the simulation framework proposed in [28]. We encode RBAC 0 as a workload, with implementations in IBE/IBS and PKI as described in Sections IV-C and IV-D. Simulations are initialized from start states extracted from real-world RBAC datasets.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior work has noted that practically evaluating an access control system must take into account the application in which the system is to be used, as well as additional cost metrics (e.g., computation, ease of use). This analysis problem has been identified as a system's suitability to a particular application [15], [16]. Suitability analysis formalizes an application's access control requirements (a workload), and uses expressiveness to prove that an access control system can satisfy those requirements.…”
Section: A Motivating Examplesmentioning
confidence: 99%
“…Further properties enforced above this baseline include using the identity query mapping for authorization requests (to ensure that T 's authorization questions are the queries being used to simulate S's authorization requests), forbidding string manipulations (to prohibit the state mapping from using arbitrary encodings to store information in the contents of strings such as user names), and restricting the command mapping from mapping nonadministrative commands in S to administrative commands in T . This framework has since been used to evaluate the suitability of certain general-purpose access control systems for various unique, application-specific requirements [15], [16].…”
Section: B Prior Workmentioning
confidence: 99%