On the use of Max-SAT and PDDL in RBAC maintenance

Cybersecurity - Tập 2 Số 1 - 2019
Marco Benedetti1, Marco Mori1
1Bank of Italy, ICT Department, Centro Donato Menichella, Roma, Italy

Tóm tắt

Từ khóa


Tài liệu tham khảo

Baumgrass, A, Strembeck M (2013) Bridging the gap between role mining and role engineering via migration guides. Inf Secur Tech Rep 17(4):148–72.

Benedetti, M, Mori M (2018) Parametric RBAC Maintenance via Max-SAT In: Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies, 15–25.. ACM, Indianapolis, Indiana.

Colantonio, A, Di Pietro R, Ocello A (2008) A cost-driven approach to role engineering In: Proceedings of the 2008 ACM symposium on Applied computing, 2129–2136.. ACM, Fortaleza, Ceara.

Cook, SA (1971) The complexity of theorem-proving procedures In: Proceedings of the third annual ACM symposium on Theory of computing, 151–158.. ACM, Shaker Heights, Ohio.

Ferraiolo, DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed nist standard for role-based access control. ACM Trans Inf Syst Secur (TISSEC) 4(3):224–274.

Fisler, K, Krishnamurthi S, Meyerovich LA, Tschantz MC (2005) Verification and change-impact analysis of access-control policies In: Proceedings of the 27th International Conference on Software Engineering, ICSE ’05, 196–205.. ACM, New York.

Ghallab, M, Nau D, Traverso P (2004) Automated Planning: Theory and Practice. Elsevier.

Guo, Q, Vaidya J, Atluri V (2008) The role hierarchy mining problem: Discovery of optimal role hierarchies In: Computer Security Applications Conference, 2008. ACSAC 2008, 237–246.. IEEE, Anaheim, California.

Hu, J, Zhang Y, Li R, Lu Z (2010) Role updating for assignments In: Proceedings of the 15th ACM symposium on Access control models and technologies, 89–98.. ACM, Pittsburgh, Pennsylvania.

Jafarian, JH, Takabi H, Touati H, Hesamifard E, Shehab M (2015) Towards a general framework for optimal role mining: A constraint satisfaction approach In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 211–220.. ACM, Vienna.

Johnson, DS (1973) Approximation algorithms for combinatorial problems In: Proceedings of the fifth annual ACM symposium on Theory of computing, 38–49.. ACM, Austin, Texas.

Kern, A, Kuhlmann M, Schaad A, Moffett J (2002) Observations on the role life-cycle in the context of enterprise security management In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, SACMAT ’02, 43–51.. ACM, New York.

Luo, C, Cai S, Su K, Huang W (2017) Ccehc: An efficient local search algorithm for weighted partial maximum satisfiability. Artif Intell 243:26–44.

McDermott, D, Ghallab M, Howe A, Knoblock C, Ram A, Veloso M, Weld D, Wilkins D (1998) PDDL - The Planning Domain Definition Language CVC TR-98-003/DCS TR-1165 (Oct.)Yale Center for Computational Vision and Control, Yale University.

Mitra, B, Sural S, Vaidya J, Atluri V (2016) A survey of role mining. ACM Comput Surv (CSUR) 48(4):50.

Molloy, I, Chen H, Li T, Wang Q, Li N, Bertino E, Calo S, Lobo J (2008) Mining roles with semantic meanings In: Proceedings of the 13th ACM symposium on Access control models and technologies, 21–30.. ACM, Estes Park, CO.

Mori, M, Benedetti M (2019) Web page with downloadable experiments and datasets. https://onlinerbacfixing.github.io/cybersecurity2019/ . Accessed 1 Apr 2019.

Ni, Q, Lobo J, Calo S, Rohatgi P, Bertino E (2009) Automating role-based provisioning by learning from examples In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT ’09, 75–84.. ACM, New York.

Saenko, I, Kotenko I2016. Reconfiguration of rbac schemes by genetic algorithms.

Seipp, J, Röger G (2018) Fast Downward Stone Soup 2018 (planner abstract). In Ninth International Planning Competition (IPC 2018), Deterministic Part:72–74.

Takabi, H, Joshi JB (2010) Stateminer: An efficient similarity-based approach for optimal mining of role hierarchy In: Proceedings of the 15th ACM symposium on Access control models and technologies, 55–64.. ACM, Pittsburgh, Pennsylvania.

Tseitin, GS (1983) On the complexity of derivation in propositional calculus In: Automation of reasoning, 466–483.. Springer.

Vaidya, J, Atluri V, Guo Q, Adam N (2008) Migrating to optimal rbac with minimal perturbation In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11–20.. ACM, Estes Park, CO.

Wachs, HL2014. How to succeed with role management and avoid common pitfalls. Research Document G00262708. Gartner, Inc., Stamford, CT 06902-7700, U.S.

Wachs, HL2015. Take control of enterprise role management. Research Document G00262285. Gartner, Inc., Stamford, CT 06902-7700, U.S.

Xia, H, Dawande M, Mookerjee V (2014) Role refinement in access control: Model and analysis. INFORMS J Comput 26(4):866–884.

Zhang, W, Chen Y, Gunter C, Liebovitz D, Malin B (2013) Evolving role definitions through permission invocation patterns In: Proceedings of the 18th ACM symposium on Access control models and technologies, 37–48.. ACM, Amsterdam.