A framework for policy similarity evaluation and migration based on change detection

Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Access control facilitates controlled sharing and protection of resources in an enterprise. However, given the ubiquity of collaborative applications and scenarios, enterprises no longer function in isolation. Being able to measure policy similarity and integrate heterogeneous policies appropriately is an essential step towards secure interoperation. Existing approaches for measuring policy similarity are based on computing similarity between different components of the access control policy. However, this does not provide a pathway for integrating policies, and may not sufficiently take the security context into account. In this paper, we propose a holistic change detection approach that enables policy similarity evaluation and policy migration. Our approach more comprehensively takes into account different access control semantics to compute policy similarity and finds the common organizational policy with the least cost.

Original languageEnglish (US)
Title of host publicationNetwork and System Security - 9th International Conference, NSS 2015, Proceedings
EditorsShouhuai Xu, Meikang Qiu, Haibo Zhang, Moti Yung
PublisherSpringer Verlag
Pages191-205
Number of pages15
ISBN (Print)9783319256443
DOIs
StatePublished - 2015
Event9th International Conference on Network and System Security, NSS 2015 - New York, United States
Duration: Nov 3 2015Nov 5 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9408
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Conference on Network and System Security, NSS 2015
CountryUnited States
CityNew York
Period11/3/1511/5/15

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Keywords

  • Access control
  • Change detection
  • Policy migration
  • Policy similarity

Fingerprint Dive into the research topics of 'A framework for policy similarity evaluation and migration based on change detection'. Together they form a unique fingerprint.

Cite this