Access control inference and feedback for policy managers: a fine-grained analysis

Ranga Raju Vatsavai, Sharma Chakravarthy, M. Mohania
{"title":"Access control inference and feedback for policy managers: a fine-grained analysis","authors":"Ranga Raju Vatsavai, Sharma Chakravarthy, M. Mohania","doi":"10.1109/POLICY.2006.9","DOIUrl":null,"url":null,"abstract":"As the IT infrastructure complexity and pervasiveness grows, autonomic computing can greatly simplify its deployment and usage. Essentially, the goal of autonomic computing is to shift the burden of management of the component systems from the user to the system. In order to accomplish this, autonomic computing demands that the system be able to accept high level policies, analyze them, and provide meaningful feedback to simplify the usage of the infrastructure by domain experts and minimize human involvement in the loop. Policies, in general are defined at a higher level in terms of business objects, their attributes, and operations. On the other hand managed resources, on which the policies are finally going to execute, have their own access control lists to limit the operations that an application user can perform. As a result, many policies which are syntactically and semantically correct, may fail to execute at run time due to ACL violations. This paper describes an approach wherein the information on access control provided at the managed resources level is leveraged to check for policy executability and provide meaningful feedback in case there are problems. This is done at policy specification time as opposed to runtime, which is not desirable, as is typically done by current systems. Furthermore, this avoids redundant access control specifications which can lead to inconsistencies in addition to being a burden on the user. A pragmatic approach for checking policy executability from an access control viewpoint and providing several types of feedback are the focus of this paper","PeriodicalId":169233,"journal":{"name":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","volume":"166 5-6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POLICY.2006.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

As the IT infrastructure complexity and pervasiveness grows, autonomic computing can greatly simplify its deployment and usage. Essentially, the goal of autonomic computing is to shift the burden of management of the component systems from the user to the system. In order to accomplish this, autonomic computing demands that the system be able to accept high level policies, analyze them, and provide meaningful feedback to simplify the usage of the infrastructure by domain experts and minimize human involvement in the loop. Policies, in general are defined at a higher level in terms of business objects, their attributes, and operations. On the other hand managed resources, on which the policies are finally going to execute, have their own access control lists to limit the operations that an application user can perform. As a result, many policies which are syntactically and semantically correct, may fail to execute at run time due to ACL violations. This paper describes an approach wherein the information on access control provided at the managed resources level is leveraged to check for policy executability and provide meaningful feedback in case there are problems. This is done at policy specification time as opposed to runtime, which is not desirable, as is typically done by current systems. Furthermore, this avoids redundant access control specifications which can lead to inconsistencies in addition to being a burden on the user. A pragmatic approach for checking policy executability from an access control viewpoint and providing several types of feedback are the focus of this paper
策略管理人员的访问控制推断和反馈:细粒度分析
随着IT基础设施的复杂性和普遍性的增长,自主计算可以大大简化其部署和使用。本质上,自主计算的目标是将组件系统的管理负担从用户转移到系统。为了实现这一点,自主计算要求系统能够接受高级策略,分析它们,并提供有意义的反馈,以简化领域专家对基础设施的使用,并最大限度地减少人类在循环中的参与。策略通常是根据业务对象、它们的属性和操作在更高的层次上定义的。另一方面,策略最终将在托管资源上执行,托管资源有自己的访问控制列表,以限制应用程序用户可以执行的操作。因此,许多在语法和语义上正确的策略可能由于违反ACL而无法在运行时执行。本文描述了一种方法,利用在受管理资源级别提供的访问控制信息来检查策略的可执行性,并在出现问题时提供有意义的反馈。这是在策略规范时完成的,而不是在运行时完成的,这是不可取的,因为当前系统通常是这样做的。此外,这避免了冗余的访问控制规范,这些规范除了给用户增加负担外,还可能导致不一致。从访问控制的角度检查策略可执行性的实用方法以及提供几种类型的反馈是本文的重点
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信