Constraint-enhanced role engineering via answer set programming

Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang

    Research output: Chapter in Book / Conference PaperConference Paperpeer-review

    10 Citations (Scopus)

    Abstract

    Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security and business requirements. An inconsistency between configurations and constraints compromises security and availability, as it may authorize otherwise forbidden access and deprive users of due privileges. In this paper, we apply answer set programming (ASP) to discover RBAC configurations that comply with constraints and meet various optimization objectives. We first formulate the need of supporting constraints as a problem independent of and complementary to existing RE problems. We then present a flexible framework for translating the proposed problem to ASP programs. In this way, the problem can be addressed via ASP solvers. Finally, we demonstrate the effectiveness and efficiency of our approach through experimental results.
    Original languageEnglish
    Title of host publicationASIACCS'12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, May 2-4, 2012, Seoul, Korea
    PublisherACM Publishing
    Number of pages12
    ISBN (Print)9781450313032
    DOIs
    Publication statusPublished - 2012
    EventACM Symposium on Information_Computer and Communications Security -
    Duration: 2 May 2012 → …

    Conference

    ConferenceACM Symposium on Information_Computer and Communications Security
    Period2/05/12 → …

    Keywords

    • answer set programming
    • logic programming
    • role engineering
    • role-based access control

    Fingerprint

    Dive into the research topics of 'Constraint-enhanced role engineering via answer set programming'. Together they form a unique fingerprint.

    Cite this