the proceedings contain 24 papers. the topics discussed include: Mohawk+T: efficient analysis of administrative temporal role-based accesscontrol (ATRBAC) policies;automated inference of accesscontrol policies for w...
ISBN:
(纸本)9781450335560
the proceedings contain 24 papers. the topics discussed include: Mohawk+T: efficient analysis of administrative temporal role-based accesscontrol (ATRBAC) policies;automated inference of accesscontrol policies for web applications;SecLoc: securing location-sensitive storage in the cloud;a logical approach to restricting access in online social networks;preventing information inference in accesscontrol;on missing attributes in accesscontrol: non-deterministic and probabilistic attribute retrieval;relationship-based accesscontrol for an open-source medical records system;federated access management for collaborative network environments: framework and case study;a prototype to reduce the amount of accessible information;a SMT-based tool for the analysis and enforcement of NATO content-based protection and release policies;towards an automatic top-down role engineering approach using natural language processing techniques;and generating secure images for CAPTCHAs through noise addition.
the proceedings contain 20 papers. the topics discussed include: fast exact and heuristic methods for role minimization problems;migrating to optimal RBAC with minimal perturbation;mining roles with semantic meanings;...
ISBN:
(纸本)9781605581293
the proceedings contain 20 papers. the topics discussed include: fast exact and heuristic methods for role minimization problems;migrating to optimal RBAC with minimal perturbation;mining roles with semantic meanings;delegation and satisfiability in workflow systems;enforcing security properties in task-based systems;task-based entailment constraints for basic workflow patterns;role on role engineering;RBAC administration in distributed systems;policy decomposition for collaborative accesscontrol;context-aware role-based accesscontrol in pervasive computing systems;a general obligation model and continuity-enhanced policy enforcement engine for usage control;an obligation model bridging accesscontrol policies and privacy policies;measuring integrity on mobile phone systems;and detecting and resolving policy misconfigurations in access-control systems.
the proceedings contain 20 papers. the topics discussed include: ToneCheck: unveiling the impact of dialects in privacy policy;make split, not hijack: preventing feature-space hijacking attacks in split learning;makin...
ISBN:
(纸本)9798400704918
the proceedings contain 20 papers. the topics discussed include: ToneCheck: unveiling the impact of dialects in privacy policy;make split, not hijack: preventing feature-space hijacking attacks in split learning;making privacy-preserving federated graph analytics practical (for certain queries);SecureCheck: user-centric and geolocation-aware access mediation contracts for sharing private data;static and dynamic analysis of a usage control system;SPRT: automatically adjusting SELinux policy for vulnerability mitigation;utilizing threat partitioning for more practical network anomaly detection;prompting LLM to enforce and validate CIS critical security control;pairing human and artificial intelligence: enforcing accesscontrol policies with LLMs and formal specifications;and BlueSky: how to raise a robot — a case for neuro-symbolic ai in constrained task planning for humanoid assistive robots.
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu...
详细信息
ISBN:
(纸本)9781450335560
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particular problem, the user-authorization query problem (UAQ) in Role-Based accesscontrol (RBAC). We show how to systematically generate hard instances for it. We then analyze what we call the structure of those hard instances. Our work brings the important aspect of systematic investigation of hard input classes to accesscontrol research.
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de...
详细信息
ISBN:
(纸本)9781450335560
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary decisions to utilize users' blacklists in accesscontrol policies, resulting into eight access restrictions. We formally define these restrictions in a hybrid logic for relationship-based accesscontrol, and provide syntactical transformations to rewrite a hybrid logic accesscontrol formula when fixing an access restriction. this enables a flexible and user-friendly approach for restricting access in social networks. We develop efficient algorithms for enforcing a subset of accesscontrol policies with restrictions. the effectiveness of the access restrictions and the efficiency of our algorithms are evaluated on a Facebook dataset.
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes accesscontrol decisions. Existing cloud...
详细信息
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal fr...
详细信息
ISBN:
(纸本)9781450375689
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal frameworks hinder data processing, requiring companies to design complex human-driven processes in order to gather, aggregate, and process data in a compliant way. Our proposal addresses this lack of automation with an accesscontrol mechanism extending XacmL, an accesscontrol standard with language and implementation, to regulate operations with multiple data policies.
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy conce...
详细信息
Understanding accesscontrol policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced accesscontrol policy in a system is no...
详细信息
ISBN:
(纸本)9781450375689
Understanding accesscontrol policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced accesscontrol policy in a system is not available. In fact, scale and complexity of a system, or unavailability of its source code, may prevent users and even its developers from having access to such accurate specification. In this paper, we propose a novel, systematic approach for learning accesscontrol policies where target systems are treated as black boxes. In particular, we show how we can construct a deterministic finite automaton (DFA) characterizing the relationship-based accesscontrol (ReBAC) policy of a system by interacting with its accesscontrol engine using minimal number of access requests. Our experiments on realistic application scenarios and their promising results demonstrate the feasibility, scalability and efficiency of our learning approach.
暂无评论