skip to main content
10.1145/2613087.2613106acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Reduction of access control decisions

Published:25 June 2014Publication History

ABSTRACT

Access control has been proposed as "the" solution to prevent unauthorized accesses to sensitive system resources. Historically, access control models use a two-valued decision set to indicate whether an access should be granted or denied. Many access control models have extended the two-valued decision set to indicate, for instance, whether a policy is applicable to an access query or an error occurred during policy evaluation. Decision sets are often coupled with operators for combining decisions from multiple applicable policies. Although a larger decision set is more expressive, it may be necessary to reduce it to a smaller set in order to simplify the complexity of decision making or enable comparison between access control models. Moreover, some access control mechanisms like XACML~v3 uses more than one decision set. The projection from one decision set to the other may result in a loss of accuracy, which can affect the final access decision. In this paper, we present a formal framework for the analysis and comparison of decision sets centered on the notion of decision reduction. In particular, we introduce the notion of safe reduction, which ensures that a reduction can be performed at any level of policy composition without changing the final decision. We demonstrate the framework by analyzing XACML v3 against the notion of safe reduction. From this analysis, we draw guidelines for the selection of the minimal decision set with respect to a given set of combining operators.

References

  1. eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, OASIS, 2005.Google ScholarGoogle Scholar
  2. eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard, OASIS, 2012.Google ScholarGoogle Scholar
  3. O. Arieli and A. Avron. The value of the four values. Artificial Intelligence, 102(1):97--141, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise Privacy Authorization Language (EPAL). Technical report, IBM Research, Rüschlikon, 2003.Google ScholarGoogle Scholar
  5. D. E. Bell and L. J. LaPadula. Secure computer systems: A mathematical model, Volume II. Journal of Computer Security, 4(2/3):229--263, 1996.Google ScholarGoogle Scholar
  6. D. F. C. Brewer and M. J. Nash. The Chinese Wall Security Policy. In Proceedings of Symposium on Security and Privacy, pages 329--339. IEEE, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  7. G. Bruns and M. Huth. Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition. TISSEC, 14(1):9, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P.-C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In Proceedings of Symposium on Security and Privacy, pages 222--230. IEEE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Crampton and M. Huth. An authorization framework resilient to policy evaluation failures. In Computer Security, LNCS 6345, pages 472--487. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Crampton and C. Morisset. PTaCL: A language for attribute-based access control in open systems. In Proceedings of POST, LNCS 7215, pages 390--409. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. De Capitani Di Vimercati, S. Foresti, P. Samarati, and S. Jajodia. Access control policies and languages. Int. J. Comput. Sci. Eng., 3(2):94--102, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. F. Ferraiolo and D. R. Kuhn. Role-based access control. In Proceedings of the 15th National Computer Security Conference, pages 554--563, 1992.Google ScholarGoogle Scholar
  13. M. Harrison, W. Ruzzo, and J. Ullman. Protection in operating systems. Commun.\ ACM, 19(8):461--471, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. Jobe. Functional completeness and canonical forms in many-valued logics. Journal of Symbolic Logic, 27(4):409--422, 1962.Google ScholarGoogle ScholarCross RefCross Ref
  15. B. W. Lampson. Protection. SIGOPS Oper. Syst. Rev., 8(1):18--24, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Li, Q. Wang, W. H. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin. Access control policy combining: theory meets practice. In Proceedings of 14th ACM SACMAT, pages 135--144. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Q. Ni, E. Bertino, and J. Lobo. D-algebra for composing access control policy decisions. In Proceedings of ACM AsiaCCS, pages 298--309. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo. An algebra for fine-grained integration of XACML policies. In Proceedings of 14th ACM SACMAT, pages 63--72. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. Trivellato, N. Zannone, M. Glaundrup, J. Skowronek, and S. Etalle. A semantic security framework for systems of systems. Int. J. Cooperative Inf. Syst., 22(1), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  20. M. C. Tschantz and S. Krishnamurthi. Towards reasonability properties for access-control policy languages. In Proceedings of 11th ACM SACMAT, pages 160--169. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2--3):107--136, 1993.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Reduction of access control decisions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
        June 2014
        234 pages
        ISBN:9781450329392
        DOI:10.1145/2613087

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 June 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SACMAT '14 Paper Acceptance Rate17of58submissions,29%Overall Acceptance Rate177of597submissions,30%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader