Towards quantitative analysis of proofs of authorization: Applications, framework, and techniques

J. Lee Adam, Yu Ting

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine these outcomes within a more continuous space. In this paper, we develop a formal model that allows us to quantitatively reason about the outcomes of the policy enforcement process in both absolute (i.e., user to ideal case) and relative (i.e., user to user) terms. Within this framework, it becomes possible to quantify, e.g., the robustness of a user's proof of authorization to possible perturbations in the system, how close an unauthorized user is to satisfying a particular policy, and relative "top-k" style rankings of the best users to carry out a particular task. To this end, we explore several interesting classes of scoring functions for assessing the robustness of authorization decisions, and develop criteria under which these types of functions can be composed with one another. We further show that these types of functions can be extended to quantify how close unauthorized users are to satisfying policies, which can be a useful risk metric for decision making under unexpected circumstances.

Original languageEnglish
Title of host publication23rd IEEE Computer Security Foundations Symposium, CSF 2010
Pages139-153
Number of pages15
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event23rd Computer Security Foundations Symposium, CSF 2010 - Edinburgh, United Kingdom
Duration: 17 Jul 201019 Jul 2010

Publication series

NameProceedings - IEEE Computer Security Foundations Symposium
ISSN (Print)1940-1434

Conference

Conference23rd Computer Security Foundations Symposium, CSF 2010
Country/TerritoryUnited Kingdom
CityEdinburgh
Period17/07/1019/07/10

Keywords

  • Access control
  • Policy
  • Risk
  • Trust management

Fingerprint

Dive into the research topics of 'Towards quantitative analysis of proofs of authorization: Applications, framework, and techniques'. Together they form a unique fingerprint.

Cite this