Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques

Lee, Adam J and Yu, Ting (2010) Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. In: 2010 23rd IEEE Computer Security Foundations Symposium. IEEE, New York, 139 - 153. ISBN 978-1-4244-7511-7

[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)

Abstract

Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine these outcomes within a more continuous space. In this paper, we develop a formal model that allows us to quantitatively reason about the outcomes of the policy enforcement process in both absolute (i.e., user to ideal case) and relative (i.e., user to user) terms. Within this framework, it becomes possible to quantify, e.g., the robustness of a user's proof of authorization to possible perturbations in the system, how close an unauthorized user is to satisfying a particular policy, and relative “top-k” style rankings of the best users to carry out a particular task. To this end, we explore several interesting classes of scoring functions for assessing the robustness of authorization decisions, and develop criteria under which these types of functions can be composed with one another. We further show that these types of functions can be extended to quantify how close unauthorized users are to satisfying policies, which can be a useful risk metric for decision making under unexpected circumstances.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: Book Section
Status: Published
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Lee, Adam Jadamlee@pitt.eduADAMLEE
Yu, Ting
Date: 2010
Date Type: Publication
Publisher: IEEE
Place of Publication: New York
Page Range: 139 - 153
DOI or Unique Handle: 10.1109/csf.2010.17
Schools and Programs: Dietrich School of Arts and Sciences > Computer Science
Refereed: Yes
ISBN: 978-1-4244-7511-7
Title of Book: 2010 23rd IEEE Computer Security Foundations Symposium
Official URL: http://dx.doi.org/10.1109/CSF.2010.17
Date Deposited: 27 Nov 2012 18:39
Last Modified: 25 Aug 2017 05:05
URI: http://d-scholarship.pitt.edu/id/eprint/16481

Metrics

Monthly Views for the past 3 years

Plum Analytics

Altmetric.com


Actions (login required)

View Item View Item