On the suitability of dissemination-centric access control systems for group-centric sharing
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Access control schemes come in all shapes and sizes, which makes choosing the right one for a particular application a challenge.Yet today's techniques for comparing access control schemes completely ignore the setting in which the scheme is to be deployed.In this paper, we present a formal framework for comparing access control schemes with respect to a particular application.The analyst's main task is to evaluate an access control scheme in terms of how well it implements a given access control workload (a formalism that we introduce to represent an application's access control needs).One implementation is better than another if it has stronger security guarantees, and in this paper we introduce several such guarantees: correctness, homomorphism, AC-preservation, safety, administration-preservation, and compatibility.The scheme that admits the implementation with the strongest guarantees is deemed the best fit for the application.We demonstrate the use of our framework by evaluating two workloads on ten different access control schemes.