Managing access control complexity using metrices

  • Authors:
  • Trent Jeager

  • Affiliations:
  • IBM T.J. Watson Research Center, Hawthorne, NY

  • Venue:
  • SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

General access control models enable flexible expression of access control policies, but they make the verification of whether a particular access control configuration is safe (i.e., prevents the leakage of a permission to an unauthorized subject) difficult. The current approach to expressing safety policy in such models is to use constraints. When the constraints are verified, then the configuration is verified to be safe. However, the addition of constraints to an access control configuration significantly increases its complexity, so it quickly becomes difficult to understand the access control policy expressed in the configuration such that future changes can be made correctly. We propose an approach whereby the complexity of each access control configuration is estimated, so the administrators can see the effect of a configuration change on the future ability to maintain the configuration. We identify metrics for making complexity estimates and evaluate these metrics on some constraint examples. Our goal is to enable the use of flexible access control models for safety-critical systems by permitting limited use of constraints that do not complicate the configuration beyond a maintainable complexity.