TY - GEN
T1 - Enforcing separation of duty in attribute based access control systems
AU - Jha, Sadhana
AU - Sural, Shamik
AU - Atluri, Vijayalakshmi
AU - Vaidya, Jaideep
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - Conventional access control models like discretionary access control and role based access control are suitable for regulating access to resources by known users of an organization. However, for systems where the user population is dynamic and the identities of all users are not known in advance, attribute based access control (ABAC) can be more conveniently used. The set of constraints supported by an access control model acts as a deciding factor for the type of restrictions it can put on unauthorized access. Among the various types of constraints, enforcement of Separation of Duty (SoD) is considered to be the most important in any commercial application. In this paper, we introduce the problem of SoD enforcement in the context of ABAC. We analyze the complexity of the problem and provide a methodology for solving it.Experiments on a wide range of data sets show encouraging results.
AB - Conventional access control models like discretionary access control and role based access control are suitable for regulating access to resources by known users of an organization. However, for systems where the user population is dynamic and the identities of all users are not known in advance, attribute based access control (ABAC) can be more conveniently used. The set of constraints supported by an access control model acts as a deciding factor for the type of restrictions it can put on unauthorized access. Among the various types of constraints, enforcement of Separation of Duty (SoD) is considered to be the most important in any commercial application. In this paper, we introduce the problem of SoD enforcement in the context of ABAC. We analyze the complexity of the problem and provide a methodology for solving it.Experiments on a wide range of data sets show encouraging results.
KW - Attribute based access control
KW - Mutually exclusive policies
KW - Policy enforcement
KW - Separation of duty
UR - http://www.scopus.com/inward/record.url?scp=84951952558&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84951952558&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-26961-0_5
DO - 10.1007/978-3-319-26961-0_5
M3 - Conference contribution
AN - SCOPUS:84951952558
SN - 9783319269603
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 61
EP - 78
BT - Information Systems Security - 11th International Conference, ICISS 2015, Proceedings
A2 - Jajodia, Sushil
A2 - Mazumdar, Chandan
PB - Springer Verlag
T2 - 11th International Conference on Information Systems Security, ICISS 2015
Y2 - 16 December 2015 through 20 December 2015
ER -