Skip to main content
Top

2019 | OriginalPaper | Chapter

Towards an Automated Extraction of ABAC Constraints from Natural Language Policies

Authors : Manar Alohaly, Hassan Takabi, Eduardo Blanco

Published in: ICT Systems Security and Privacy Protection

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the recent trend towards attribute-based access control (ABAC), several studies have proposed constraints specification languages for ABAC. These formal languages enable security architects to express constraints in a precise mathematical notation. However, since manually formulating constraints involves analyzing multiple natural language policy documents in order to infer constraints-relevant information, constraints specification becomes a repetitive, time-consuming and error-prone task. To bridge the gap between the natural language expression of constraints and formal representations, we propose an automated framework to infer elements forming ABAC constraints from natural language policies. Our proposed approach is built upon recent advancements in natural language processing, specifically, sequence labeling. The experiments, using Bidirectional Long-Short Term Memory (BiLSTM), achieved an F1 score of 0.91 in detecting at least 75% of each constraint expression. The results suggest that the proposed approach holds promise for enabling this automation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
In these examples track, position and employmentType are attribute names. According to the constraints specification language, ABCL [2, 3], attributeName (OE(U)) is an expression that computes all possible values of the respective attribute while assignedEntities returns the entities that satisfy certain attribute values.
 
2
A token is usually defined as “an instance of a sequence of characters in some particular document that are grouped together as a useful semantic unit for processing.”
 
3
A noun phrase is a sequence of words consisting of a head noun and zero or more modifying adjectives and/or nouns.
 
4
A named entity is a real-world object, such as persons, locations, organizations, products, etc.
 
Literature
1.
go back to reference Alohaly, M., Takabi, H., Blanco, E.: A deep learning approach for extracting attributes of ABAC policies. In: Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (2018) Alohaly, M., Takabi, H., Blanco, E.: A deep learning approach for extracting attributes of ABAC policies. In: Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (2018)
2.
go back to reference Bijon, K.Z., Krishman, R., Sandhu, R.: Constraints specication in attribute based access control. Science 2(3), 131 (2013) Bijon, K.Z., Krishman, R., Sandhu, R.: Constraints specication in attribute based access control. Science 2(3), 131 (2013)
3.
go back to reference Bijon, K.Z., Krishnan, R., Sandhu, R.: Towards an attribute based constraints specification language. In: 2013 International Conference on Social Computing (SocialCom), pp. 108–113. IEEE (2013) Bijon, K.Z., Krishnan, R., Sandhu, R.: Towards an attribute based constraints specification language. In: 2013 International Conference on Social Computing (SocialCom), pp. 108–113. IEEE (2013)
4.
go back to reference Chen, D., Manning, C.: A fast and accurate dependency parser using neural networks. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 740–750 (2014) Chen, D., Manning, C.: A fast and accurate dependency parser using neural networks. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 740–750 (2014)
5.
go back to reference Fader, A., Soderland, S., Etzioni, O.: Identifying relations for open information extraction. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 1535–1545. Association for Computational Linguistics (2011) Fader, A., Soderland, S., Etzioni, O.: Identifying relations for open information extraction. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 1535–1545. Association for Computational Linguistics (2011)
6.
go back to reference Franzén, K., Eriksson, G., Olsson, F., Asker, L., Lidén, P., Cöster, J.: Protein names and how to find them. Int. J. Med. Inform. 67(1–3), 49–61 (2002)CrossRef Franzén, K., Eriksson, G., Olsson, F., Asker, L., Lidén, P., Cöster, J.: Protein names and how to find them. Int. J. Med. Inform. 67(1–3), 49–61 (2002)CrossRef
7.
go back to reference Helil, N., Rahman, K.: Attribute based access control constraint based on subject similarity. In: 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), pp. 226–229. IEEE (2014) Helil, N., Rahman, K.: Attribute based access control constraint based on subject similarity. In: 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), pp. 226–229. IEEE (2014)
8.
go back to reference Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication 800-162 (2013) Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication 800-162 (2013)
10.
go back to reference Jha, S., Sural, S., Atluri, V., Vaidya, J.: Specification and verification of separation of duty constraints in attribute-based access control. IEEE Trans. Inf. Forensics Secur. 13(4), 897–911 (2018)CrossRef Jha, S., Sural, S., Atluri, V., Vaidya, J.: Specification and verification of separation of duty constraints in attribute-based access control. IEEE Trans. Inf. Forensics Secur. 13(4), 897–911 (2018)CrossRef
13.
go back to reference Kang, T., Zhang, S., Xu, N., Wen, D., Zhang, X., Lei, J.: Detecting negation and scope in chinese clinical notes using character and word embedding. Comput. Methods Prog. Biomed. 140, 53–59 (2017)CrossRef Kang, T., Zhang, S., Xu, N., Wen, D., Zhang, X., Lei, J.: Detecting negation and scope in chinese clinical notes using character and word embedding. Comput. Methods Prog. Biomed. 140, 53–59 (2017)CrossRef
14.
go back to reference Kübler, S., McDonald, R., Nivre, J.: Dependency Parsing. Morgan & Claypool Publishers, San Rafael (2009)CrossRef Kübler, S., McDonald, R., Nivre, J.: Dependency Parsing. Morgan & Claypool Publishers, San Rafael (2009)CrossRef
15.
go back to reference Lafferty, J., McCallum, A., Pereira, F.C.: Conditional random fields: probabilistic models for segmenting and labeling sequence data (2001) Lafferty, J., McCallum, A., Pereira, F.C.: Conditional random fields: probabilistic models for segmenting and labeling sequence data (2001)
16.
go back to reference Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013) Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:​1301.​3781 (2013)
17.
go back to reference Miyao, Y., Butler, A., Yoshimoto, K., Tsujii, J.: A modular architecture for the wide-coverage translation of natural language texts into predicate logic formulas. In: Proceedings of the 24th Pacific Asia Conference on Language, Information and Computation (2010) Miyao, Y., Butler, A., Yoshimoto, K., Tsujii, J.: A modular architecture for the wide-coverage translation of natural language texts into predicate logic formulas. In: Proceedings of the 24th Pacific Asia Conference on Language, Information and Computation (2010)
18.
go back to reference Narouei, M., Khanpour, H., Takabi, H., Parde, N., Nielsen, R.: Towards a top-down policy engineering framework for attribute-based access control. In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 103–114. ACM (2017) Narouei, M., Khanpour, H., Takabi, H., Parde, N., Nielsen, R.: Towards a top-down policy engineering framework for attribute-based access control. In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 103–114. ACM (2017)
19.
go back to reference Narouei, M., Takabi, H.: Towards an automatic top-down role engineering approach using natural language processing techniques. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, pp. 157–160. ACM (2015) Narouei, M., Takabi, H.: Towards an automatic top-down role engineering approach using natural language processing techniques. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, pp. 157–160. ACM (2015)
20.
go back to reference Pennington, J., Socher, R., Manning, C.: GloVe: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532–1543 (2014) Pennington, J., Socher, R., Manning, C.: GloVe: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532–1543 (2014)
21.
go back to reference Singh, M.P.: AHCSABAC: attribute value hierarchies and constraints specification in attribute-based access control. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 35–41. IEEE (2016) Singh, M.P.: AHCSABAC: attribute value hierarchies and constraints specification in attribute-based access control. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 35–41. IEEE (2016)
22.
go back to reference Slankas, J., Williams, L.: Access control policy identification and extraction from project documentation. Acad. Sci. Eng. Sci. 2(3), 145–159 (2013) Slankas, J., Williams, L.: Access control policy identification and extraction from project documentation. Acad. Sci. Eng. Sci. 2(3), 145–159 (2013)
23.
go back to reference Slankas, J., Xiao, X., Williams, L., Xie, T.: Relation extraction for inferring access control rules from natural language artifacts. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 366–375. ACM (2014) Slankas, J., Xiao, X., Williams, L., Xie, T.: Relation extraction for inferring access control rules from natural language artifacts. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 366–375. ACM (2014)
24.
go back to reference Tjong Kim Sang, E.F., De Meulder, F.: Introduction to the CoNLL-2003 shared task: language-independent named entity recognition. In: Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003, vol. 4, pp. 142–147. Association for Computational Linguistics (2003) Tjong Kim Sang, E.F., De Meulder, F.: Introduction to the CoNLL-2003 shared task: language-independent named entity recognition. In: Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003, vol. 4, pp. 142–147. Association for Computational Linguistics (2003)
25.
go back to reference Xiao, X., Paradkar, A., Thummalapenta, S., Xie, T.: Automated extraction of security policies from natural-language software documents. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, p. 12. ACM (2012) Xiao, X., Paradkar, A., Thummalapenta, S., Xie, T.: Automated extraction of security policies from natural-language software documents. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, p. 12. ACM (2012)
Metadata
Title
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies
Authors
Manar Alohaly
Hassan Takabi
Eduardo Blanco
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-22312-0_8

Premium Partner