Constraint-enhanced role engineering via answer set programming

Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

11 Citations (Scopus)

Abstract

Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security and business requirements. An inconsistency between configurations and constraints compromises security and availability, as it may authorize otherwise forbidden access and deprive users of due privileges. In this paper, we apply answer set programming (ASP) to discover RBAC configurations that comply with constraints and meet various optimization objectives. We first formulate the need of supporting constraints as a problem independent of and complementary to existing RE problems. We then present a flexible framework for translating the proposed problem to ASP programs. In this way, the problem can be addressed via ASP solvers. Finally, we demonstrate the effectiveness and efficiency of our approach through experimental results.
Original languageEnglish
Title of host publicationASIACCS'12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, May 2-4, 2012, Seoul, Korea
PublisherACM Publishing
Number of pages12
ISBN (Print)9781450313032
DOIs
Publication statusPublished - 2012
EventACM Symposium on Information_Computer and Communications Security -
Duration: 2 May 2012 → …

Conference

ConferenceACM Symposium on Information_Computer and Communications Security
Period2/05/12 → …

Keywords

  • answer set programming
  • logic programming
  • role engineering
  • role-based access control

Fingerprint

Dive into the research topics of 'Constraint-enhanced role engineering via answer set programming'. Together they form a unique fingerprint.

Cite this