Title:
Network-centric Access Control: Models and Techniques

dc.contributor.author Wang, Ting
dc.contributor.author Srivatsa, Mudhakar
dc.contributor.author Agrawal, Dakshi
dc.contributor.corporatename Georgia Institute of Technology. College of Computing
dc.contributor.corporatename Georgia Institute of Technology. Center for Experimental Research in Computer Systems
dc.date.accessioned 2011-02-15T14:27:01Z
dc.date.available 2011-02-15T14:27:01Z
dc.date.issued 2010-09-21
dc.description.abstract In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to information sharing (such as Multi-Level Security (MLS)) adopted a node-centric model wherein each user (social subjects) and each object (information object) is treated in isolation (e.g., using clearance levels for subjects and sensitivity levels for objects in MLS). Over the last two decades information sharing models have been enriched to partially account for relationships between subjects (e.g., Role-based Access Control (RBAC)), relationships between objects (e.g., Chinese-wall model), and relationships between subjects and objects (e.g., Separation of Duty (SoD) constraints). In this paper, we present a novel network-centric access control paradigm that explicitly accounts for network-effects in information flows, and yet offers scalable and flexible risk estimation regarding access control decisions. The goal of this paper is not to prescribe a risk-model for information flows; instead we enable a class of risk-models by developing scalable algorithms to estimate prior and posterior information flow likelihood using the structure of social and information networks. For instance, our network-centric access control model answers questions of the form: Does subject s already have access (via her social network) to object o? If subject s is given access to object o, what is the likelihood that subject sʼ learns object oʼ (where the subjects s and sʼ are related via the social network and the objects o and oʼ are related via the information network)? This paper makes three contributions. First, we show that several state-of-the-art access control models can be encoded using a network-centric access control paradigm, typically by encoding relationships as network edges (subject-subject, object-object and subject-object). Second, we present a suite of composable operators over social and information networks that enable scalable risk estimation for information flows. Third, we evaluate our solutions using the IBM SmallBlue dataset that was collected over a span of one year from an enterprise social network of size over 40,000. en_US
dc.identifier.uri http://hdl.handle.net/1853/36900
dc.language.iso en_US en_US
dc.publisher Georgia Institute of Technology en_US
dc.relation.ispartofseries CERCS ; GIT-CERCS-10-08 en_US
dc.subject Access control en_US
dc.subject Information flow en_US
dc.subject Information object en_US
dc.subject Information sharing en_US
dc.subject Multi-level security en_US
dc.subject Network-centric en_US
dc.subject Risk estimates en_US
dc.subject Social network en_US
dc.title Network-centric Access Control: Models and Techniques en_US
dc.type Text
dc.type.genre Technical Report
dspace.entity.type Publication
local.contributor.corporatename Center for Experimental Research in Computer Systems
local.relation.ispartofseries CERCS Technical Report Series
relation.isOrgUnitOfPublication 1dd858c0-be27-47fd-873d-208407cf0794
relation.isSeriesOfPublication bc21f6b3-4b86-4b92-8b66-d65d59e12c54
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
git-cercs-10-08.pdf
Size:
449.44 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.76 KB
Format:
Item-specific license agreed upon to submission
Description: