skip to main content
10.1145/1180405.1180421acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Resiliency policies in access control

Published: 30 October 2006 Publication History

Abstract

We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An example resiliency policy requires that, upon removal of any s users, there should still exist d disjoint sets of users such that the users in each set together possess certain permissions of interest. Such a policy ensures that even when emergency situations cause some users to be absent, there still exist independent teams of users that have the permissions necessary for carrying out critical tasks. The Resiliency Checking Problem determines whether an access control state satisfies a given resiliency policy. We show that the general case of the problem and several subcases are intractable (NP-hard), and identify two subcases that are solvable in linear time. For the intractable cases, we also identify the complexity class in the polynomial hierarchy to which these problems belong. We discuss the design and evaluation of an algorithm that can efficiently solve instances of nontrivial sizes that belong to the intractable cases of the problem. Finally, we study the consistency problem between resiliency policies and static separation of duty policies.

References

[1]
G.-J. Ahn and R. S. Sandhu. Role-based authorization constraints specification. ACM Transactions on Information and System Security, 3(4):207--226, Nov. 2000.
[2]
D. D. Clark and D. R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184--194. IEEE Computer Society Press, May 1987.
[3]
J. Crampton. Specifying and enforcing constraints in role-based access control. In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT 2003), pages 43--50, Como, Italy, June 2003.
[4]
Daniel Le Berre (project leader). SAT4J: A satisfiability library for Java. URL http://www.sat4j.org/, Jan. 2006.
[5]
D. Du, J. Gu, and P. M. Pardalos, editors. Satisfiability Problem: Theory and Applications, volume 35 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science. AMS Press, 1997.
[6]
M. R. Garey and D. J. Johnson. Computers And Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, 1979.
[7]
V. D. Gligor, S. I. Gavrila, and D. F. Ferraiolo. On the formal definition of separation-of-duty policies and their composition. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 172--183, May 1998.
[8]
G. S. Graham and P. J. Denning. Protection ¿principles and practice. In Proceedings of the AFIPS Spring Joint Computer Conference, volume 40, pages 417--429. AFIPS Press, May 16-18 1972.
[9]
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461--471, Aug. 1976.
[10]
T. Jaeger and J. E. Tidswell. Practical safety in flexible access control models. ACM Transactions on Information and System Security, 4(2):158--190, May 2001.
[11]
M. Koch, L. V. Mancini, and F. Parisi-Presicce. Decidability of safety in graph-based models for access control. In Proceedings of the Seventh European Symposium on Research in Computer Security (ESORICS 2002), pages 229--243. Springer, Oct. 2002.
[12]
M. Koch, L. V. Mancini, and F. Parisi-Presicce. A graph-based formalism for RBAC. ACM Transactions on Information and System Security, 5(3):332--365, Aug. 2002.
[13]
B. W. Lampson. Protection. In Proceedings of the 5th Princeton Conference on Information Sciences and Systems, 1971. Reprinted in ACM Operating Systems Review, 8(1):18--24, Jan 1974.
[14]
N. Li, Z. Bizri, and M. V. Tripunitara. On mutually-exclusive roles and separation of duty. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS-11), pages 42--51. ACM Press, Oct. 2004.
[15]
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 52(3):474--514, May 2005. Preliminary version appeared in Proceedings of 2003 IEEE Symposiumon Security and Privacy.
[16]
N. Li and M. V. Tripunitara. Security analysis in role-based access control. In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004), pages 126--135, June 2004.
[17]
R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. Journal of the ACM, 24(3):455--464, 1977.
[18]
M. J. Nash and K. R. Poland. Some conundrums concerning separation of duty. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 201--209, May 1990.
[19]
C. H. Papadimitriou. Computational Complexity. Addison Wesley Longman, 1994.
[20]
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, September 1975.
[21]
R. Sandhu. Separation of duties in computerized information systems. In Proceedings of the IFIP WG11.3 Workshop on Database Security, Sept. 1990.
[22]
R. S. Sandhu. The schematic protection model: Its definition and analysis for acyclic attenuating systems. Journal of the ACM, 35(2):404--432, 1988.
[23]
R. S. Sandhu. Transaction control expressions for separation of duties. In Proceedings of the Fourth Annual Computer Security Applications Conference (ACSAC'88), Dec. 1988.
[24]
R. S. Sandhu. The typed access matrix model. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 122--136. IEEE Computer Society Press, May 1992.
[25]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, February 1996.
[26]
T. T. Simon and M. E. Zurko. Separation of duty in role-based environments. In Proceedings of The 10th Computer Security Foundations Workshop, pages 183--194. IEEE Computer Society Press, June 1997.

Cited By

View all
  • (2019)Results in Workflow ResiliencyProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300038(185-196)Online publication date: 13-Mar-2019
  • (2017)Role updating in information systems using model checkingKnowledge and Information Systems10.1007/s10115-016-0974-451:1(187-234)Online publication date: 1-Apr-2017
  • (2016)Cloud Multidomain Access Control Model Based on Role and Trust-DegreeJournal of Electrical and Computer Engineering10.1155/2016/98205902016Online publication date: 1-Apr-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
October 2006
434 pages
ISBN:1595935185
DOI:10.1145/1180405
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. fault-tolerant
  3. policy design

Qualifiers

  • Article

Conference

CCS06
Sponsor:
CCS06: 13th ACM Conference on Computer and Communications Security 2006
October 30 - November 3, 2006
Virginia, Alexandria, USA

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Results in Workflow ResiliencyProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300038(185-196)Online publication date: 13-Mar-2019
  • (2017)Role updating in information systems using model checkingKnowledge and Information Systems10.1007/s10115-016-0974-451:1(187-234)Online publication date: 1-Apr-2017
  • (2016)Cloud Multidomain Access Control Model Based on Role and Trust-DegreeJournal of Electrical and Computer Engineering10.1155/2016/98205902016Online publication date: 1-Apr-2016
  • (2015)Hard Instances for Verification Problems in Access ControlProceedings of the 20th ACM Symposium on Access Control Models and Technologies10.1145/2752952.2752959(161-164)Online publication date: 1-Jun-2015
  • (2014)Dynamic Workflow Adjustment with Security ConstraintsProceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 856610.1007/978-3-662-43936-4_14(211-226)Online publication date: 14-Jul-2014
  • (2012)Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization ModelsIEICE Transactions on Communications10.1587/transcom.E95.B.1508E95.B:5(1508-1518)Online publication date: 2012
  • (2012)Conflict detection in security policies using Semantic Web technology2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL)10.1109/ESTEL.2012.6400092(1-6)Online publication date: Oct-2012
  • (2012)Satisfiability and Feasibility in a Relationship-Based Workflow Authorization ModelComputer Security – ESORICS 201210.1007/978-3-642-33167-1_7(109-126)Online publication date: 2012
  • (2011)On the Complexity of Authorization in RBAC under Qualification and Security ConstraintsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2010.558:6(883-897)Online publication date: 1-Nov-2011
  • (2011)Integrating constraints to support legally flexible business processesInformation Systems Frontiers10.1007/s10796-009-9190-z13:2(171-189)Online publication date: 1-Apr-2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media