@inproceedings{9416553354b74b20b71fb9c97ed1722f,
title = "Towards quantitative analysis of proofs of authorization: Applications, framework, and techniques",
abstract = "Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine these outcomes within a more continuous space. In this paper, we develop a formal model that allows us to quantitatively reason about the outcomes of the policy enforcement process in both absolute (i.e., user to ideal case) and relative (i.e., user to user) terms. Within this framework, it becomes possible to quantify, e.g., the robustness of a user's proof of authorization to possible perturbations in the system, how close an unauthorized user is to satisfying a particular policy, and relative {"}top-k{"} style rankings of the best users to carry out a particular task. To this end, we explore several interesting classes of scoring functions for assessing the robustness of authorization decisions, and develop criteria under which these types of functions can be composed with one another. We further show that these types of functions can be extended to quantify how close unauthorized users are to satisfying policies, which can be a useful risk metric for decision making under unexpected circumstances.",
keywords = "Access control, Policy, Risk, Trust management",
author = "Adam, {J. Lee} and Yu Ting",
year = "2010",
doi = "10.1109/CSF.2010.17",
language = "English",
isbn = "9780769540825",
series = "Proceedings - IEEE Computer Security Foundations Symposium",
pages = "139--153",
booktitle = "23rd IEEE Computer Security Foundations Symposium, CSF 2010",
note = "23rd Computer Security Foundations Symposium, CSF 2010 ; Conference date: 17-07-2010 Through 19-07-2010",
}