skip to main content
10.1145/3532105.3535032acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
poster

Poster: A Flexible Relationship-Based Access Control Policy Generator

Published: 08 June 2022 Publication History

Abstract

A plethora of Relationship-Based Access Control (ReBAC) models have been proposed, varying in the types of policies they can express. This fragmentation has stifled the creation of a benchmark to directly compare the performance of ReBAC systems based on their common supported policies. To solve this problem, we propose RACON, a schema-driven, customisable ReBAC policy generator. RACON generates policies in an intermediate language subsuming the features required to encode existing ReBAC models. This language can subsequently be translated to popular ReBAC policy languages through an extensible translation module. Taking a view of ReBAC policies as graph queries, we implement translations into two popular graph query languages, namely Cypher and SPARQL.

References

[1]
Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, and Adrian Waller. 2013. Policy templates for relationship-based access control. In Annual International Conference on Privacy, Security and Trust. IEEE, 221--228.
[2]
G. Bagan, A. Bonifati, R. Ciucanu, G. H. L. Fletcher, A. Lemay, and N. Advokaat. 2017. gMark: Schema-Driven Generation of Graphs and Queries. IEEE Transactions on Knowledge and Data Engineering 29, 4 (2017), 856--869.
[3]
Angela Bonifati, George H. L. Fletcher, Hannes Voigt, and Nikolay Yakovets. 2018. Querying Graphs. Morgan & Claypool Publishers.
[4]
Barbara Carminati and Elena Ferrari. 2011. Collaborative access control in on-line social networks. In International Conference on Collaborative Computing. IEEE, 231--240.
[5]
Yuan Cheng, Jaehong Park, and Ravi S. Sandhu. 2016. An Access Control Model for Online Social Networks Using User-to-User Relationships. IEEE Trans. Dependable Secur. Comput. 13, 4 (2016), 424--436.
[6]
Philip W. L. Fong and Ida Sri Rejeki Siahaan. 2011. Relationship-based access control policies and their policy languages. In SACMAT. ACM, 51--60.
[7]
Inc. JCC Consulting. 2022. Graph Query Language GQL. Retrieved April 13, 2022 from https://www.gqlstandards.org/
[8]
Jorge Lobo. 2019. Relationship-based access control: More than a social network access control model. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9, 2 (2019), e1282.
[9]
Edelmira Pasarella and Jorge Lobo. 2017. A Datalog Framework for Modeling Relationship-based Access Control Policies. In SACMAT. ACM, 91--102.
[10]
Syed Zain R. Rizvi and Philip W. L. Fong. 2020. Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model. ACM Trans. Priv. Secur. 23, 4 (2020), 18:1--18:33.
[11]
Zhongyuan Xu and Scott D Stoller. 2014. Mining attribute-based access control policies from logs. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 276--291.

Index Terms

  1. Poster: A Flexible Relationship-Based Access Control Policy Generator

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
    June 2022
    282 pages
    ISBN:9781450393577
    DOI:10.1145/3532105
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 June 2022

    Check for updates

    Author Tags

    1. benchmark
    2. policy generation
    3. relationship-based access control

    Qualifiers

    • Poster

    Conference

    SACMAT '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 177 of 597 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 97
      Total Downloads
    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media