SlideShare a Scribd company logo
11World-Leading Research with Real-World Impact!
Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
Department of Computer Science
Department of Electrical and Computer Engineering
University of Texas, San Antonio
Institute for Cyber Security
ABAC’17, March 24, 2017, Scottsdale, AZ, USA
Attribute Transformation for
Attribute-Based Access Control
22World-Leading Research with Real-World Impact!
Outline
Summary
Motivation
Attribute Transformation
Attribute Reduction
Attribute Expansion
Conclusion
Q/A
33World-Leading Research with Real-World Impact!
Summary
We have presented a concept of attribute transformation and specify two types of
transformation---attribute reduction and attribute expansion.
44World-Leading Research with Real-World Impact!
Motivation
Attribute explosion!
Figure 1: Attributes defined for OpenStack Virtual Machines
55World-Leading Research with Real-World Impact!
Motivation (continuing)
incurs
difficulties in managing
Attribute Explosion
authorization policies attribute-value assignments
66World-Leading Research with Real-World Impact!
Motivation (continuing)
We cannot get rid of attributes we need.
But we can manage
with
Attribute Transformation
77World-Leading Research with Real-World Impact!
Attribute Transformation (assumptions)
Attribute types
Non-policy Attributes Policy Attributes
Examples:
Object attributes (Non-policy):
size, created_by, shared, location
Object attributes (Policy):
sensitivity, security-label
Assumptions:
Non-policy Attributes Policy Attributes = φ∩
Non-policy Attributes >> Policy Attributes
88
Attribute Transformation
World-Leading Research with Real-World Impact!
Types of attribute transformation
Reduction
(Non-policy Attr → Policy Attr)
Expansion
(Policy Attr → Policy Attr)
Attribute Transformation is the process of transforming one set of attribute-value
assignments into another set of assignments.
Attribute Reduction
The process of transforming non-policy attribute-value assignments into policy
attributes-value assignments.
9
size(f1)=100MB
created-by(f1) =
system-d
location(f1)=
/log/system-log
security-label(f) =
sensitiveshared(f1)= false
Deriving assignments
Derived assignments Effective assignments
Non-policy attributes
Policy attributes
Attribute
transformation
security-label(f) =
sensitive
1010
Attribute Reduction (motivation)
World-Leading Research with Real-World Impact!
Motivation from literature:
2. Concepts of Dynamic
roles by Kuhn, Coyne and
Weil [2]
1. Attribute-Based User-Role
Assignment [1]
Attribute Reduction (usefulness)
Useful for
Abstraction Modular design Hierarchical policy
11
Can-read ≡ security-label(o) = sensitive role(u)=managerʌ
VM-mapping ≡ resource-type(o) = VM image-type(o) = corporateʌ →
security-label(o) = sensitive
Firewall-mapping ≡ resource-type(o) = firewall protocol(o) = UDPʌ ʌ
network(o) = internal → security-label(o) = sensitive
Attribute Reduction (usefulness)
12
Authorization policy with Policy attributes:
Mapping rules with Non-policy Attributes:
Attribute Reduction (mapping rules)
13
Example of mapping rule:
file-length(f) = 100 MB ˄ created-by(f) = system-d is-˄
shared(f) = false → security-label(f) = sensitive
Attribute Reduction (issues)
resource-
type(o) = VM
encryption(o)
= plain
security-label(o)
= regular
resource-type(o)
= VM
image-type(o)
= corporate
mapping1
mapping2
Conflicts resulting from multiple mappings
14
security-label(o)
= sensitive
resource-type(o) =
VM
encryption(o) =
plain
security-label(o) =
regular
mapping1
security-label(o) =
sensitive
Derivedvalue
Explicitlyassigned
value
Attribute Reduction (issues)
Conflicts resulting from assigned and derived values
15
is-a-veteran(u)
= True
benefits(u) =
{b1,b2}
skills(u) =
{skill1, skill2}
Deriving assignments
Derived assignments Resulting assignments
Policy attributes
Policy attributes
leadership(u)
= True
Policy attributes
is-a-veteran(u)
= True
Attribute Expansion
Expansion
16
The process of transforming policy attribute-value assignments into a
different set of policy attributes-value assignments.
skills(u) =
{skill1, skill2}
Attribute Expansion (motivation)
Motivation from literature:
1. Hierarchical Group and Attribute-Based Access Control [3]
17
Conclusion
What next?
- Other forms of Attribute Transformation
- Chain of Attribute Transformation
- Fitting Attribute Transformation in ABAC models
18
References
1. Servos, Daniel, and Sylvia L. Osborn. "HGABAC: Towards a formal model of hierarchical attribute-based
access control." International Symposium on Foundations and Practice of Security. Springer International
Publishing, 2014.
2. Kuhn, D. Richard, Edward J. Coyne, and Timothy R. Weil. "Adding attributes to role-based access control."
Computer 43.6 (2010): 79-81.
3. Servos, Daniel, and Sylvia L. Osborn. "HGABAC: Towards a formal model of hierarchical attribute-based
access control." International Symposium on Foundations and Practice of Security. Springer International
Publishing, 2014.
19
20

More Related Content

PPT
Abac17 prosun-slides
PDF
Deep Learning for Computer Vision: Saliency Prediction (UPC 2016)
PDF
Introductions to Neural Networks,Basic concepts
PPTX
Digit recognizer by convolutional neural network
PDF
Generative Models and Adversarial Training (D3L4 2017 UPC Deep Learning for ...
PDF
Tipus materials 02
PDF
Social media for pr สปสช
PDF
Sor Teresa Gedda Biografia
Abac17 prosun-slides
Deep Learning for Computer Vision: Saliency Prediction (UPC 2016)
Introductions to Neural Networks,Basic concepts
Digit recognizer by convolutional neural network
Generative Models and Adversarial Training (D3L4 2017 UPC Deep Learning for ...
Tipus materials 02
Social media for pr สปสช
Sor Teresa Gedda Biografia

Similar to Abac17 prosun-slides (20)

PDF
Attribute based access control
PPTX
Boost privacy protections with attribute-based access control
PPTX
smu_abac_150410.pptx
PPTX
Industrial Strength Access Control for Spring Applications
PPTX
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
PPTX
What’s Happening in Information Risk Management
PPTX
Attribute-Based Access Control: Fine-Grained Security Management
PPTX
Top Ten Reasons Why Developers Don't Adopt ABAC
PDF
Data-Centric Security for the Extended Enterprise
PDF
CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel
PPTX
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
PDF
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]
PPTX
Do you have a business case for Attribute Based Access Control (ABAC)?
PPTX
Do you have a business case for Attribute Based Access Control (ABAC)?
PDF
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
DOCX
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
PDF
Isaca journal - bridging the gap between access and security in big data...
PPTX
Attribute based access control
PDF
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
PDF
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
Attribute based access control
Boost privacy protections with attribute-based access control
smu_abac_150410.pptx
Industrial Strength Access Control for Spring Applications
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
What’s Happening in Information Risk Management
Attribute-Based Access Control: Fine-Grained Security Management
Top Ten Reasons Why Developers Don't Adopt ABAC
Data-Centric Security for the Extended Enterprise
CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Accumulo Summit 2015: Extending Accumulo to Support ABAC using XACML [Security]
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?
IRJET- Priviledge Level Attribute Based Encryption Policy for Big Data Ac...
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
Isaca journal - bridging the gap between access and security in big data...
Attribute based access control
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
Ad

More from UT, San Antonio (20)

PPTX
digital certificate - types and formats
PPTX
Saml metadata
PPTX
Static Analysis with Sonarlint
PPTX
Shellshock- from bug towards vulnerability
TXT
Recitation
TXT
Recitation
PDF
Big Data Processing: Performance Gain Through In-Memory Computation
PDF
Enumerated authorization policy ABAC (EP-ABAC) model
PDF
Where is my Privacy presentation slideshow (one page only)
PDF
Three month course
PDF
One month-syllabus
PPT
Zerovm backgroud
PPTX
Security_of_openstack_keystone
PDF
Research seminar group_1_prosunjit
DOCX
Attribute Based Encryption
PPT
Final Project Transciption Factor DNA binding Prediction
PDF
Cyber Security Exam 2
PDF
Transcription Factor DNA Binding Prediction
PPT
Transcription Factor DNA Binding Prediction
digital certificate - types and formats
Saml metadata
Static Analysis with Sonarlint
Shellshock- from bug towards vulnerability
Recitation
Recitation
Big Data Processing: Performance Gain Through In-Memory Computation
Enumerated authorization policy ABAC (EP-ABAC) model
Where is my Privacy presentation slideshow (one page only)
Three month course
One month-syllabus
Zerovm backgroud
Security_of_openstack_keystone
Research seminar group_1_prosunjit
Attribute Based Encryption
Final Project Transciption Factor DNA binding Prediction
Cyber Security Exam 2
Transcription Factor DNA Binding Prediction
Transcription Factor DNA Binding Prediction
Ad

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
573137875-Attendance-Management-System-original
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Digital Logic Computer Design lecture notes
PPTX
web development for engineering and engineering
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
PPT on Performance Review to get promotions
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Welding lecture in detail for understanding
PDF
Well-logging-methods_new................
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
573137875-Attendance-Management-System-original
Model Code of Practice - Construction Work - 21102022 .pdf
Sustainable Sites - Green Building Construction
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
bas. eng. economics group 4 presentation 1.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Embodied AI: Ushering in the Next Era of Intelligent Systems
Operating System & Kernel Study Guide-1 - converted.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Digital Logic Computer Design lecture notes
web development for engineering and engineering
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT on Performance Review to get promotions
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Structs to JSON How Go Powers REST APIs.pdf
Welding lecture in detail for understanding
Well-logging-methods_new................
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

Abac17 prosun-slides

  • 1. 11World-Leading Research with Real-World Impact! Prosunjit Biswas, Ravi Sandhu and Ram Krishnan Department of Computer Science Department of Electrical and Computer Engineering University of Texas, San Antonio Institute for Cyber Security ABAC’17, March 24, 2017, Scottsdale, AZ, USA Attribute Transformation for Attribute-Based Access Control
  • 2. 22World-Leading Research with Real-World Impact! Outline Summary Motivation Attribute Transformation Attribute Reduction Attribute Expansion Conclusion Q/A
  • 3. 33World-Leading Research with Real-World Impact! Summary We have presented a concept of attribute transformation and specify two types of transformation---attribute reduction and attribute expansion.
  • 4. 44World-Leading Research with Real-World Impact! Motivation Attribute explosion! Figure 1: Attributes defined for OpenStack Virtual Machines
  • 5. 55World-Leading Research with Real-World Impact! Motivation (continuing) incurs difficulties in managing Attribute Explosion authorization policies attribute-value assignments
  • 6. 66World-Leading Research with Real-World Impact! Motivation (continuing) We cannot get rid of attributes we need. But we can manage with Attribute Transformation
  • 7. 77World-Leading Research with Real-World Impact! Attribute Transformation (assumptions) Attribute types Non-policy Attributes Policy Attributes Examples: Object attributes (Non-policy): size, created_by, shared, location Object attributes (Policy): sensitivity, security-label Assumptions: Non-policy Attributes Policy Attributes = φ∩ Non-policy Attributes >> Policy Attributes
  • 8. 88 Attribute Transformation World-Leading Research with Real-World Impact! Types of attribute transformation Reduction (Non-policy Attr → Policy Attr) Expansion (Policy Attr → Policy Attr) Attribute Transformation is the process of transforming one set of attribute-value assignments into another set of assignments.
  • 9. Attribute Reduction The process of transforming non-policy attribute-value assignments into policy attributes-value assignments. 9 size(f1)=100MB created-by(f1) = system-d location(f1)= /log/system-log security-label(f) = sensitiveshared(f1)= false Deriving assignments Derived assignments Effective assignments Non-policy attributes Policy attributes Attribute transformation security-label(f) = sensitive
  • 10. 1010 Attribute Reduction (motivation) World-Leading Research with Real-World Impact! Motivation from literature: 2. Concepts of Dynamic roles by Kuhn, Coyne and Weil [2] 1. Attribute-Based User-Role Assignment [1]
  • 11. Attribute Reduction (usefulness) Useful for Abstraction Modular design Hierarchical policy 11
  • 12. Can-read ≡ security-label(o) = sensitive role(u)=managerʌ VM-mapping ≡ resource-type(o) = VM image-type(o) = corporateʌ → security-label(o) = sensitive Firewall-mapping ≡ resource-type(o) = firewall protocol(o) = UDPʌ ʌ network(o) = internal → security-label(o) = sensitive Attribute Reduction (usefulness) 12 Authorization policy with Policy attributes: Mapping rules with Non-policy Attributes:
  • 13. Attribute Reduction (mapping rules) 13 Example of mapping rule: file-length(f) = 100 MB ˄ created-by(f) = system-d is-˄ shared(f) = false → security-label(f) = sensitive
  • 14. Attribute Reduction (issues) resource- type(o) = VM encryption(o) = plain security-label(o) = regular resource-type(o) = VM image-type(o) = corporate mapping1 mapping2 Conflicts resulting from multiple mappings 14 security-label(o) = sensitive
  • 15. resource-type(o) = VM encryption(o) = plain security-label(o) = regular mapping1 security-label(o) = sensitive Derivedvalue Explicitlyassigned value Attribute Reduction (issues) Conflicts resulting from assigned and derived values 15
  • 16. is-a-veteran(u) = True benefits(u) = {b1,b2} skills(u) = {skill1, skill2} Deriving assignments Derived assignments Resulting assignments Policy attributes Policy attributes leadership(u) = True Policy attributes is-a-veteran(u) = True Attribute Expansion Expansion 16 The process of transforming policy attribute-value assignments into a different set of policy attributes-value assignments. skills(u) = {skill1, skill2}
  • 17. Attribute Expansion (motivation) Motivation from literature: 1. Hierarchical Group and Attribute-Based Access Control [3] 17
  • 18. Conclusion What next? - Other forms of Attribute Transformation - Chain of Attribute Transformation - Fitting Attribute Transformation in ABAC models 18
  • 19. References 1. Servos, Daniel, and Sylvia L. Osborn. "HGABAC: Towards a formal model of hierarchical attribute-based access control." International Symposium on Foundations and Practice of Security. Springer International Publishing, 2014. 2. Kuhn, D. Richard, Edward J. Coyne, and Timothy R. Weil. "Adding attributes to role-based access control." Computer 43.6 (2010): 79-81. 3. Servos, Daniel, and Sylvia L. Osborn. "HGABAC: Towards a formal model of hierarchical attribute-based access control." International Symposium on Foundations and Practice of Security. Springer International Publishing, 2014. 19
  • 20. 20