SoK: Access Control Policy Generation from High-level Natural Language
Requirements
- URL: http://arxiv.org/abs/2310.03292v1
- Date: Thu, 5 Oct 2023 03:45:20 GMT
- Title: SoK: Access Control Policy Generation from High-level Natural Language
Requirements
- Authors: Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage,
Giovanni Russello
- Abstract summary: Administrator-centered access control failures can cause data breaches, putting organizations at risk of financial loss and reputation damage.
Existing graphical policy configuration tools and automated policy generation frameworks attempt to help administrators configure and generate access control policies by avoiding such failures.
However, graphical policy configuration tools are prone to human errors, making them unusable.
On the other hand, automated policy generation frameworks are prone to erroneous predictions, making them unreliable.
- Score: 1.3505077405741583
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Administrator-centered access control failures can cause data breaches,
putting organizations at risk of financial loss and reputation damage. Existing
graphical policy configuration tools and automated policy generation frameworks
attempt to help administrators configure and generate access control policies
by avoiding such failures. However, graphical policy configuration tools are
prone to human errors, making them unusable. On the other hand, automated
policy generation frameworks are prone to erroneous predictions, making them
unreliable. Therefore, to find ways to improve their usability and reliability,
we conducted a Systematic Literature Review analyzing 49 publications, to
identify those tools, frameworks, and their limitations. Identifying those
limitations will help develop effective access control policy generation
solutions while avoiding access control failures.
Related papers
- RAGent: Retrieval-based Access Control Policy Generation [1.2016264781280588]
RAGent is a novel retrieval-based access control policy generation framework based on language models.
RAGent identifies access requirements from high-level requirement specifications with an average state-of-the-art F1 score of 87.9%.
Unlike existing frameworks, RAGent generates policies with complex components like purposes and conditions, in addition to subjects, actions, and resources.
arXiv Detail & Related papers (2024-09-08T00:23:37Z) - Automatically Adaptive Conformal Risk Control [49.95190019041905]
We propose a methodology for achieving approximate conditional control of statistical risks by adapting to the difficulty of test samples.
Our framework goes beyond traditional conditional risk control based on user-provided conditioning events to the algorithmic, data-driven determination of appropriate function classes for conditioning.
arXiv Detail & Related papers (2024-06-25T08:29:32Z) - Automated SELinux RBAC Policy Verification Using SMT [0.0]
Security-Enhanced Linux (SE Linux) is a Linux kernel module that allows for a role-based access control mechanism.
We present a tool to automate the conversion of SE Linux policies into satisfiability modulo theories (SMT)
Our tool is capable of flagging common policy misconfigurations by asserting consistency between supplied RBAC policies and the intended specification.
arXiv Detail & Related papers (2023-12-04T11:10:10Z) - In-Distribution Barrier Functions: Self-Supervised Policy Filters that
Avoid Out-of-Distribution States [84.24300005271185]
We propose a control filter that wraps any reference policy and effectively encourages the system to stay in-distribution with respect to offline-collected safe demonstrations.
Our method is effective for two different visuomotor control tasks in simulation environments, including both top-down and egocentric view settings.
arXiv Detail & Related papers (2023-01-27T22:28:19Z) - Using Constraint Programming and Graph Representation Learning for
Generating Interpretable Cloud Security Policies [12.43505973436359]
Cloud security relies on Identity Access Management (IAM) policies that IT admins need to properly configure and periodically update.
We develop a novel framework that encodes generating optimal IAM policies using constraint programming (CP)
We show that our optimized IAM policies significantly reduce the impact of security attacks using real data from 8 commercial organizations, and synthetic instances.
arXiv Detail & Related papers (2022-05-02T22:15:07Z) - Learning Robust Policy against Disturbance in Transition Dynamics via
State-Conservative Policy Optimization [63.75188254377202]
Deep reinforcement learning algorithms can perform poorly in real-world tasks due to discrepancy between source and target environments.
We propose a novel model-free actor-critic algorithm to learn robust policies without modeling the disturbance in advance.
Experiments in several robot control tasks demonstrate that SCPO learns robust policies against the disturbance in transition dynamics.
arXiv Detail & Related papers (2021-12-20T13:13:05Z) - Certification of Iterative Predictions in Bayesian Neural Networks [79.15007746660211]
We compute lower bounds for the probability that trajectories of the BNN model reach a given set of states while avoiding a set of unsafe states.
We use the lower bounds in the context of control and reinforcement learning to provide safety certification for given control policies.
arXiv Detail & Related papers (2021-05-21T05:23:57Z) - Closing the Closed-Loop Distribution Shift in Safe Imitation Learning [80.05727171757454]
We treat safe optimization-based control strategies as experts in an imitation learning problem.
We train a learned policy that can be cheaply evaluated at run-time and that provably satisfies the same safety guarantees as the expert.
arXiv Detail & Related papers (2021-02-18T05:11:41Z) - Enforcing robust control guarantees within neural network policies [76.00287474159973]
We propose a generic nonlinear control policy class, parameterized by neural networks, that enforces the same provable robustness criteria as robust control.
We demonstrate the power of this approach on several domains, improving in average-case performance over existing robust control methods and in worst-case stability over (non-robust) deep RL methods.
arXiv Detail & Related papers (2020-11-16T17:14:59Z) - Runtime-Safety-Guided Policy Repair [13.038017178545728]
We study the problem of policy repair for learning-based control policies in safety-critical settings.
We propose to reduce or even eliminate control switching by repairing' the trained policy based on runtime data produced by the safety controller.
arXiv Detail & Related papers (2020-08-17T23:31:48Z) - An Automatic Attribute Based Access Control Policy Extraction from
Access Logs [5.142415132534397]
An attribute-based access control (ABAC) model provides a more flexible approach for addressing the authorization needs of complex and dynamic systems.
We present a methodology for automatically learning ABAC policy rules from access logs of a system to simplify the policy development process.
arXiv Detail & Related papers (2020-03-16T15:08:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.