Skip to main navigation Skip to search Skip to main content

Enhancing Relationship-Based Access Control Policies with Negative Rule Mining

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Relationship-based access control (ReBAC) policies often rely solely on positive authorization rules, implicitly denying all other requests by default. However, many scenarios require explicitly stating negative authorization rules to capture exceptions or special restrictions that are not naturally enforced by deny-by-default semantics. This work presents a systematic method to mine ReBAC policies that integrate both positive and negative authorization rules from observed authorizations. We formalize the mining problem, show its NP-hardness, and develop an approach that identifies minimal policies while accurately reflecting observed access decisions. We demonstrate the feasibility and effectiveness of our proposed approach through a set of experiments. Our experimental evaluations on representative datasets demonstrate that including negative rules leads to more concise and semantically complete policies, confirming the necessity of explicit negative authorizations in complex access control settings.

Original languageEnglish
Title of host publicationCODASPY 2025 - Proceedings of the 15th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery, Inc
Pages96-106
Number of pages11
ISBN (Electronic)9798400714764
DOIs
StatePublished - Jun 4 2025
Event15th ACM Conference on Data and Application Security and Privacy, CODASPY 2025 - Pittsburgh, United States
Duration: Jun 4 2025Jun 6 2025

Publication series

NameCODASPY 2025 - Proceedings of the 15th ACM Conference on Data and Application Security and Privacy

Conference

Conference15th ACM Conference on Data and Application Security and Privacy, CODASPY 2025
Country/TerritoryUnited States
CityPittsburgh
Period06/4/2506/6/25

Keywords

  • deny rules
  • negative authorization
  • policy mining
  • policy optimization
  • relationship-based access control

Fingerprint

Dive into the research topics of 'Enhancing Relationship-Based Access Control Policies with Negative Rule Mining'. Together they form a unique fingerprint.

Cite this