We describe several new bottom-up approaches to problems in role engineering for Role-Based accesscontrol (RBAC). the salient problems are all NP-complete, even to approximate, yet we find that in instances that aris...
详细信息
ISBN:
(纸本)9781605581293
We describe several new bottom-up approaches to problems in role engineering for Role-Based accesscontrol (RBAC). the salient problems are all NP-complete, even to approximate, yet we find that in instances that arise in practice these problems can be solved in minutes. We first consider role minimization, the process of finding a smallest collection of roles that can be used to implement a pre-existing user-to-permission relation. We introduce fast graph reductions that allow recovery of the solution from the solution to a problem on a smaller input graph. For Our test cases, these reductions either solve the problem, or reduce the problem enough that we find the optimum solution with a (worst-case) exponential method. We introduce lower bounds that are sharp for seven of nine test cases and are within 3.4% oil the other two. We introduce and test a new polynormial-time approximation that on average yields 2% more roles than the optimum. We next consider the related problem of minimizing the number of connections between roles and users or permissions, and we develop effective heuristic methods for this problem as well. Finally, we propose methods for several related problems.
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the...
详细信息
ISBN:
(纸本)9781595937452
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the keys of all classes lower down in the hierarchy, according to temporal constraints. In this paper we propose new constructions for time-bound hierarchical key assignment schemes which are provably secure with respect to key indistinguishability. Our constructions use as a building block any provably-secure hierarchical key assignment scheme without temporal constraints and exhibit a tradeoff among the amount of private information held by each class, the amount of public data, the complexity of key derivation, and the computational assumption on which their security is based. Moreover, the proposed schemes support updates to the access hierarchy with local changes to public information and without requiring any private information to be re-distributed. (C) 2008 Elsevier B.V. All rights reserved.
In large, and often distributed, environments, where accesscontrol information may be shared across multiple sites, the combination of individual specifications in order to define a coherent accesscontrol policy is ...
详细信息
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the...
详细信息
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the keys of all classes lower down in the hierarchy, according to temporal constraints. In this paper we propose new constructions for time-bound hierarchical key assignment schemes which are provably secure with respect to key indistinguishability. Our constructions use as a building block any provably-secure hierarchical key assignment scheme without temporal constraints and exhibit a tradeoff among the amount of private information held by each class, the amount of public data, the complexity of key derivation, and the computational assumption on which their security is based. Moreover, the proposed schemes support updates to the access hierarchy with local changes to public information and without requiring any private information to be re-distributed. (C) 2008 Elsevier B.V. All rights reserved.
there have been two parallel themes in accesscontrol re-search in recent years. On the one hand there are efforts to develop new accesscontrolmodels to meet the policy needs of real world application domains. In pa...
详细信息
ISBN:
(纸本)9781605581293
there have been two parallel themes in accesscontrol re-search in recent years. On the one hand there are efforts to develop new accesscontrolmodels to meet the policy needs of real world application domains. In parallel, and almost separately, researchers have developed policy languages for accesscontrol. this paper is motivated by the consideration that these two parallel efforts need to develop synergy. A policy language in the abstract without ties to a model gives the designer little guidance. Conversely a model may not have the machinery to express all the policy details of a given system or may deliberately leave important aspects unspecified. Our vision for the future is a world where advanced accesscontrol concepts are embodied in modelsthat are supported by policy languages in a natural intuitive manner, while allowing for details beyond the models to be further specified in the policy language. this paper studies the relationship between the Web Ontology Language (OWL) and the Role Based accesscontrol (RBAC) model. Although OWL is a web ontology language and not specifically designed for expressing authorization policies, it has been used successfully for this purpose in previous work. OWL is a leading specification language for the Semantic Web, making it a natural vehicle for providing accesscontrol in that context. In this paper we show two different ways to support the NIST Standard RBAC model in OWL and then discuss how the OWL constructions can be extended to model attribute-based RBAC or more generally attribute-based accesscontrol. We further examine and assess OWL's suitability for two other accesscontrol problems: supporting attribute based accesscontrol and performing security analysis in a trust-management framework. Copyright 2008 acm.
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer game. We have created a new Sudoku game...
详细信息
ISBN:
(纸本)9781595939760
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer game. We have created a new Sudoku game for people whose motion is impaired, called Sudoku access. this special interface allows the control of the game either by voice or by a single switch. We conducted a user study of the Sudoku accessthat shows that people can play the game quickly and accurately. Withthis special Sudoku puzzle we can help more people to get involved in computer games and contribute to develop logic thinking and concentration in students. Our research aims at building enabling technologiesthat increase individuals' functional independence in a game environment. Copyright 2008 acm.
the proceedings contain 25 papers. the topics discussed include: order-sorted dependency pairs;macros for context-free grammars;inferring precise polymorphic type dependencies in logic programs;a type system for safe ...
ISBN:
(纸本)9781605581170
the proceedings contain 25 papers. the topics discussed include: order-sorted dependency pairs;macros for context-free grammars;inferring precise polymorphic type dependencies in logic programs;a type system for safe memory management and its proof of correctness;programming with proofs and explicit contexts;towards execution time estimation in abstract machine-based languages;similarity-based reasoning in qualified logic programming;classifying integrity checking methods with regard to inconsistency tolerance;comprehending finite maps for algorithmic debugging of higher-order functional programs;parallel execution of multi-set constraint rewrite rules;a rewriting framework for the composition of accesscontrol policies;global difference constraint propagation for finite domain solvers;and dynamic variable elimination during propagation solving.
Efficiently transmitting data in wireless mesh networks requires an integrated routing, scheduling, and power control strategy. Extending previous work on fast distributed routing and power allocation in multi-hop wir...
详细信息
Modern commercial of the shelf operating systems use Discretionary accesscontrol (DAC) to protect files and other operating system resources. According to the Trusted Computer System Evaluation Criteria (TCSEC) (ofte...
详细信息
ISBN:
(纸本)9781424416936
Modern commercial of the shelf operating systems use Discretionary accesscontrol (DAC) to protect files and other operating system resources. According to the Trusted Computer System Evaluation Criteria (TCSEC) (often referred to as the Orange Book) [1], Discretionary accesscontrol is "a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. the controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory accesscontrol)." A familiar example of DAC is the UNIX accesscontrol system. In UNIX (and UNIX-based OSes such as Solaris and Linux), each file has an owner and a number of permission bits controlling which users can read/write/execute the file. the owner of a file can update these permission bits. In addition, each process has an associated user id (the effective user id) that is used to determine this process's access privileges. Intuitively, this process is considered to be acting on behalf of the user identified by its effective user id, and can access anything that user is authorized to access. It has been known since 1970's that DAC is vulnerable to trojan horses. A Trojan horse, or simply trojan, is a piece of malicious software which in addition to performing some apparently benign and useful actions, also performs hidden, malicious actions. When a user runs a trojan, the operating system treats the resulting process as acting on behalf of the user and allows it to access anything the user is authorized to access. Such trojans may be email attachments, programs downloaded from the Internet, or obtained from removable media such as USB thumb drives. By planting a trojan, an attacker can get access to resources the attacker is not authorized under the DAC policy, and is often able to abuse such privileges to take over the host or to obtain private information. DA
During the last years, the Internet has grown into a mass-medium for communication and information exchange. Millions of people are using the Internet for business and in social life. Users can be reached easily and c...
详细信息
ISBN:
(纸本)9781424416936
During the last years, the Internet has grown into a mass-medium for communication and information exchange. Millions of people are using the Internet for business and in social life. Users can be reached easily and cost-effectively. Unfortunately the Internet's open structure is the reason for its frequent misuse for illegal and criminal actions such as dissembling phishing attacks. thus, anti-phishing techniques are needed to recognize potential phishing threats. But mostly these techniques are only of reactive nature, are soon circumvented by expert frauds, or are not efficient enough. this paper describes an anti-phishing framework. A concept for trust management and a mechanism called IPclip are presented. the main idea of IPclip is to guarantee trust-by-wire in packet-switched networks by providing trustworthy location information along with every IP packet. this information is used as supplementary and trustworthy trigger to identify potential phishing threats. Besides, the proposed framework allows for tracing the threat's origin by using a set of location information.
暂无评论