Skip to main content

Detecting and resolving policy misconfigurations in Access-control systems

Publication ,  Conference
Bauer, L; Garriss, S; Reiter, MK
Published in: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
December 15, 2008

Access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration and, in the context of particular applications (e.g., health care), very severe consequences. In this paper we apply association rule mining to the history of accesses to predict changes to access-control policies that are likely to be consistent with users' intentions, so that these changes can be instituted in advance of misconfigurations interfering with legitimate accesses. Instituting these changes requires consent of the appropriate administrator, of course, and so a primary contribution of our work is to automatically determine from whom to seek consent and to minimize the costs of doing so. We show using data from a deployed access-control system that our methods can reduce the number of accesses that would have incurred costly time-of-access delays by 44%, and can correctly predict 58% of the intended policy. These gains are achieved without increasing the total amount of time users spend interacting with the system. Copyright 2008 ACM.

Duke Scholars

Published In

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

DOI

Publication Date

December 15, 2008

Start / End Page

185 / 194
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Bauer, L., Garriss, S., & Reiter, M. K. (2008). Detecting and resolving policy misconfigurations in Access-control systems. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT (pp. 185–194). https://doi.org/10.1145/1377836.1377866
Bauer, L., S. Garriss, and M. K. Reiter. “Detecting and resolving policy misconfigurations in Access-control systems.” In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, 185–94, 2008. https://doi.org/10.1145/1377836.1377866.
Bauer L, Garriss S, Reiter MK. Detecting and resolving policy misconfigurations in Access-control systems. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2008. p. 185–94.
Bauer, L., et al. “Detecting and resolving policy misconfigurations in Access-control systems.” Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, 2008, pp. 185–94. Scopus, doi:10.1145/1377836.1377866.
Bauer L, Garriss S, Reiter MK. Detecting and resolving policy misconfigurations in Access-control systems. Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2008. p. 185–194.

Published In

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

DOI

Publication Date

December 15, 2008

Start / End Page

185 / 194