Specifying and enforcing the principle of least privilege in role-based access control
نویسندگان
چکیده
The principle of least privilege in role-based access control (RBAC) is an important area of research. There are two crucial issues related to it: the specification and the enforcement. We believe that existing least privilege specification schemes are not comprehensive enough and few of the enforcement methods are likely to scale well. In this paper, we formally define the basic principle of least privilege and present different variations, called the δ-approx principle of least privilege and the minimizing-approx principle of least privilege. Since there may be more than one result to enforce the same principle of least privilege, we introduce the notation about weights of permission and role to optimize the results. Then we prove that all least privilege problems are NP-complete. As an important contribution of the paper, we show the principle of least privilege problem can be reduced to minimal cost set covering (MCSC) problem. We can borrow the existing solutions of MCSC to solve the principle of least privilege problems. Finally, different algorithms are designed to solve the proposed least privilege problems. Experiments on performance study prove the superiority of our algorithms.
منابع مشابه
Role-based Security
User role-based protection presents a exible (hence adaptive) means for enforcing diering ranges of security policies. It can emulate both mandatory and discretionary access control modes of protection. Role-based protection enforces the principle of least privilege, hence minimizing the risk of Trojan horse attacks. This paper oers a glimpse into the strengths (and some weaknesses) of role-bas...
متن کاملSmartAccess: An Intelligent Proactive Role-Based Authorization System
In role-based access control (RBAC), users and objects are assigned to one or more roles. Users should be active in the role that has the required permissions before making access requests. In other words, users should be aware of the role-permission assignments i.e., what roles are required to perform operations on objects, so that they can activate the required roles. Thus, with the increase ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملWorking Sets for the Principle of Least Privilege in Role Based Access Control (RBAC) and Desktop Operating Systems
The central topic of this thesis is the the access control principle of least privilege, which states that every user and every program should run with the least privileges necessary required to complete an intended task. Adherence of users and programs to this principle can protect a system from serious damage in case of attacks. However, as will be shown, it is in practice very hard to follow...
متن کاملPULSE: a Pluggable User-space Linux Security Environment paper
The discretionary access controls (DAC) employed by traditional operating systems only provide system administrators and users with a loose ability to specify the security policies of the system. In contrast, mandatory access controls (MAC) provide a stronger, finer-grained mechanism for specifying and enforcing system security policies. A related security concept called the principle of least ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Concurrency and Computation: Practice and Experience
دوره 23 شماره
صفحات -
تاریخ انتشار 2011