Title
Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete
Abstract
In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these delegation chains when revoking rights, which give rise to different revocation schemes. One possibility studied in the literature is to revoke rights by issuing negative authorizations, meant to ensure that the revocation is resilient to a later reissuing of the rights, and to resolve conflicts between principals by giving precedence to predecessors, i.e. principals that come earlier in the delegation chain. However, the effects of negative authorizations have been defined differently by different authors. Having identified three definitions of this effect from the literature, the first contribution of this paper is to point out that two of these three definitions pose a security threat. However, avoiding this security threat comes at a price: We prove that with the safe definition of the effect of negative authorizations, deciding whether a principal does have access to a resource is an NP-complete decision problem. We discuss two limitations that can be imposed on an access-control system in order to reduce the complexity of the problem back to a polynomial complexity: Limiting the length of delegation chains to an integer m reduces the runtime complexity of determining access to O(nm), and requiring that principals form a hierarchy that graph-theoretically forms a rooted tree makes this decision problem solvable in quadratic runtime. Finally we discuss an approach that can mitigate the complexity problem in practice without fully getting rid of NP-completeness.
Year
DOI
Venue
2016
10.1109/CSF.2016.37
2016 IEEE 29th Computer Security Foundations Symposium (CSF)
Keywords
Field
DocType
access control,delegation,revocation,resilience,negative authorization,denial,predecessor takes precedence,complexity
Psychological resilience,Integer,Permission,Decision problem,Computer security,Computer science,Revocation,Access control,Delegation,Hierarchy,Distributed computing
Conference
ISSN
ISBN
Citations 
1063-6900
978-1-5090-2608-1
1
PageRank 
References 
Authors
0.36
11
5
Name
Order
Citations
PageRank
Marcos Cramer1316.93
Pieter Van Hertum231.78
Ruben Lapauw310.36
Ingmar Dasseville441.47
Marc Denecker51626106.40