Algorithms and experience in increasing the intelligibility and hygiene of access control in large organizations

Marc Donner, David Nochlin, Dennis Shasha, Wendy Walasek

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security managers in large organizations must manage the access of tens of thousands of employees on diverse data. Databases store the access control information but the security officers use essentially manual techniques to determine who has too much access and why. We call this task the Audit Problem. The security research community has offered promising frameworks such as role-based access control, but these still leave open the problems of designing the roles and determining group memberships and of demonstrating that there are substantial benefits to be reaped from making a change. In this paper, we propose a data-mining approach that includes an algorithm that starts with a set of atomic permissions of the form (user, asset, privilege) and derives a smaller but equivalent set (user group, asset group, privilege group). The asset and privilege groups so identified constitute promising roles. The users so identified constitute useful groups. In this paper we report on actual experience with actual corporate access control data. We built a production role-based access control authorization service, storing the tables in a relational database and transmitting queries as XML 'documents' over MQ message queues. Our experiments show that the proposed algorithm can reduce the number of permission assertions by a factor of between 10 and 100. With such a reduction, the Audit Problem is brought from the absurd to the plausible.

Original languageEnglish (US)
Title of host publicationData and Applications Security
Subtitle of host publicationDevelopments and Directions - IFIP TC11 / WG11.3 Fourteenth Annual Working Conference on Database Security
PublisherSpringer New York LLC
Pages295-316
Number of pages22
ISBN (Print)0792375149, 9780792375142
StatePublished - 2001
EventIFIP TC11 / WG11.3 14th Annual Working Conference on Database Security - Schoorl, Netherlands
Duration: Aug 21 2000Aug 23 2000

Publication series

NameIFIP Advances in Information and Communication Technology
Volume73
ISSN (Print)1868-4238

Other

OtherIFIP TC11 / WG11.3 14th Annual Working Conference on Database Security
Country/TerritoryNetherlands
CitySchoorl
Period8/21/008/23/00

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Algorithms and experience in increasing the intelligibility and hygiene of access control in large organizations'. Together they form a unique fingerprint.

Cite this