Reachability Analysis for Attributes in ABAC with Group Hierarchy

01/11/2021
by   Maanak Gupta, et al.
0

Attribute-based access control (ABAC) models are widely used to provide fine-grained and adaptable authorization based on the attributes of users, resources, and other relevant entities. Hierarchial group and attribute based access control (HGABAC) model was recently proposed which introduces the novel notion of attribute inheritance through group membership. GURAG was subsequently proposed to provide an administrative model for user attributes in HGABAC, building upon the ARBAC97 and GURA administrative models. The GURA model uses administrative roles to manage user attributes. The reachability problem for the GURA model is to determine what attributes a particular user can acquire, given a predefined set of administrative rules. This problem has been previously analyzed in the literature. In this paper, we study the user attribute reachability problem based on directly assigned attributes of the user and attributes inherited via group memberships. We first define a restricted form of GURAG, called rGURAG scheme, as a state transition system with multiple instances having different preconditions and provide reachability analysis for each of these schemes. In general, we show PSPACE-complete complexity for all rGURAG schemes. We further present polynomial time algorithms to solve special instances of rGURAG schemes under restricted conditions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2021

Decentralized Policy Information Points for Multi-Domain Environments

Access control models have been developed to control authorized access t...
research
03/17/2019

Multi-Authority Attribute-Based Access Control with Smart Contract

Attribute-based access control makes access control decisions based on t...
research
12/23/2013

Predictive User Modeling with Actionable Attributes

Different machine learning techniques have been proposed and used for mo...
research
02/09/2022

Distributed Attribute-based Private Access Control

In attribute-based access control, users with certain verified attribute...
research
07/17/2023

Live Long and Prosper:Analyzing Long-Lived MOAS Prefixes in BGP

BGP exchanges reachability information in the form of prefixes, which ar...
research
02/08/2020

Data User-Based Attribute-Based Encryption

Attribute-Based Encryption (ABE) has emerged as an information-centric p...
research
05/28/2021

Improving Facial Attribute Recognition by Group and Graph Learning

Exploiting the relationships between attributes is a key challenge for i...

Please sign up or login with your details

Forgot password? Click here to reset