TY - GEN
T1 - Algorithms and experience in increasing the intelligibility and hygiene of access control in large organizations
AU - Donner, Marc
AU - Nochlin, David
AU - Shasha, Dennis
AU - Walasek, Wendy
PY - 2001
Y1 - 2001
N2 - Security managers in large organizations must manage the access of tens of thousands of employees on diverse data. Databases store the access control information but the security officers use essentially manual techniques to determine who has too much access and why. We call this task the Audit Problem. The security research community has offered promising frameworks such as role-based access control, but these still leave open the problems of designing the roles and determining group memberships and of demonstrating that there are substantial benefits to be reaped from making a change. In this paper, we propose a data-mining approach that includes an algorithm that starts with a set of atomic permissions of the form (user, asset, privilege) and derives a smaller but equivalent set (user group, asset group, privilege group). The asset and privilege groups so identified constitute promising roles. The users so identified constitute useful groups. In this paper we report on actual experience with actual corporate access control data. We built a production role-based access control authorization service, storing the tables in a relational database and transmitting queries as XML 'documents' over MQ message queues. Our experiments show that the proposed algorithm can reduce the number of permission assertions by a factor of between 10 and 100. With such a reduction, the Audit Problem is brought from the absurd to the plausible.
AB - Security managers in large organizations must manage the access of tens of thousands of employees on diverse data. Databases store the access control information but the security officers use essentially manual techniques to determine who has too much access and why. We call this task the Audit Problem. The security research community has offered promising frameworks such as role-based access control, but these still leave open the problems of designing the roles and determining group memberships and of demonstrating that there are substantial benefits to be reaped from making a change. In this paper, we propose a data-mining approach that includes an algorithm that starts with a set of atomic permissions of the form (user, asset, privilege) and derives a smaller but equivalent set (user group, asset group, privilege group). The asset and privilege groups so identified constitute promising roles. The users so identified constitute useful groups. In this paper we report on actual experience with actual corporate access control data. We built a production role-based access control authorization service, storing the tables in a relational database and transmitting queries as XML 'documents' over MQ message queues. Our experiments show that the proposed algorithm can reduce the number of permission assertions by a factor of between 10 and 100. With such a reduction, the Audit Problem is brought from the absurd to the plausible.
UR - http://www.scopus.com/inward/record.url?scp=84904258787&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84904258787&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84904258787
SN - 0792375149
SN - 9780792375142
T3 - IFIP Advances in Information and Communication Technology
SP - 295
EP - 316
BT - Data and Applications Security
PB - Springer New York LLC
T2 - IFIP TC11 / WG11.3 14th Annual Working Conference on Database Security
Y2 - 21 August 2000 through 23 August 2000
ER -