Abstract
Information plays a vital role in decision-making and driving the world further in the ever-growing digital world. Authorization, which comes immediately after authentication, is essential in restricting access to information in the digital world. Various access control models have been proposed to ensure authorization by specifying access control policies. Security analysis of access control policies is a highly challenging task. Additionally, the security analysis of decentralized access control policies is complex because decentralization simplifies policy administration but raises security concerns. Therefore, an efficient security analysis approach is required to ensure the correctness of access control policies. This chapter presents a propositional rule-based machine learning approach for analyzing the Role-Based Access Control (RBAC) policies. Specifically, the proposed method maps RBAC policies into propositional rules to analyze security policies. Extensive experiments on various datasets containing RBAC policies demonstrate that the machine learning-based approach can offer valuable insight into analyzing RBAC policies.
Reference21 articles.
1. National Institute of Standards and Technology, and National Security Agency. A Survey of Access Control Models. 2009. Available from: https://csrc.nist.gov/csrc/media/events/privilege-management-workshop/documents/pvm-model-survey-aug26-2009.pdf
2. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role based access control models. IEEE Computer. 1996;29(2):38-47. Available from: https://ieeexplore.ieee.org/document/485845
3. Kim J, Park N. Role-based access control video surveillance mechanism modeling in smart contract environment. Transactions on Emerging Tel Tech. 2022;33:e4227. DOI: 10.1002/ett.4227
4. Zhang S, Yang S, Zhu G, Luo E, Xiang JZD. A fine-grained access control scheme for electronic health records based on roles and attributes. International Conference on Ubiquitous Security. 2022;1557:25-37. DOI: 10.1007/978-981-19-0468-4_3
5. Sahani GJ, Thaker CS, Shah SM. Scalable RBAC model for large-scale applications with automatic user-role assignment. International Journal Communication Networks and Distributed Systems. 2022;28(1):120294. DOI: 10.1504/IJCNDS.2022.120294