TY - GEN
T1 - Enhancing Relationship-Based Access Control Policies with Negative Rule Mining
AU - Demirkiran, Ferhat
AU - Masoumzadeh, Amir
N1 - Publisher Copyright: © 2025 Copyright held by the owner/author(s).
PY - 2025/6/4
Y1 - 2025/6/4
N2 - Relationship-based access control (ReBAC) policies often rely solely on positive authorization rules, implicitly denying all other requests by default. However, many scenarios require explicitly stating negative authorization rules to capture exceptions or special restrictions that are not naturally enforced by deny-by-default semantics. This work presents a systematic method to mine ReBAC policies that integrate both positive and negative authorization rules from observed authorizations. We formalize the mining problem, show its NP-hardness, and develop an approach that identifies minimal policies while accurately reflecting observed access decisions. We demonstrate the feasibility and effectiveness of our proposed approach through a set of experiments. Our experimental evaluations on representative datasets demonstrate that including negative rules leads to more concise and semantically complete policies, confirming the necessity of explicit negative authorizations in complex access control settings.
AB - Relationship-based access control (ReBAC) policies often rely solely on positive authorization rules, implicitly denying all other requests by default. However, many scenarios require explicitly stating negative authorization rules to capture exceptions or special restrictions that are not naturally enforced by deny-by-default semantics. This work presents a systematic method to mine ReBAC policies that integrate both positive and negative authorization rules from observed authorizations. We formalize the mining problem, show its NP-hardness, and develop an approach that identifies minimal policies while accurately reflecting observed access decisions. We demonstrate the feasibility and effectiveness of our proposed approach through a set of experiments. Our experimental evaluations on representative datasets demonstrate that including negative rules leads to more concise and semantically complete policies, confirming the necessity of explicit negative authorizations in complex access control settings.
KW - deny rules
KW - negative authorization
KW - policy mining
KW - policy optimization
KW - relationship-based access control
UR - https://www.scopus.com/pages/publications/105011359814
U2 - 10.1145/3714393.3726510
DO - 10.1145/3714393.3726510
M3 - Conference contribution
T3 - CODASPY 2025 - Proceedings of the 15th ACM Conference on Data and Application Security and Privacy
SP - 96
EP - 106
BT - CODASPY 2025 - Proceedings of the 15th ACM Conference on Data and Application Security and Privacy
PB - Association for Computing Machinery, Inc
T2 - 15th ACM Conference on Data and Application Security and Privacy, CODASPY 2025
Y2 - 4 June 2025 through 6 June 2025
ER -