Figure 2 shows the number of anomalies detected
regarding each type (i.e. redundancy anomaly, con-
flict of fraction permissions and conflict of modal-
ities). The number of anomalies increases with the
policy size. The obtained results can be explained by
the fact that with the increase of the police size, the
probability of having anomalies increases.
Figure 2: The number of detected anomalies.
Figure 3 shows the time gained from using clus-
tering step as a function of policy size. To compute
this metric, we run our approach without clustering.
This means that the detection step is run once on the
whole set of rules. Then, we compute the difference
in running time between the two versions of our ap-
proach (i.e., with/without clustering). As shown in
this figure, the time gained increases with the number
of policy rules.
Figure 3: Time gained from clustering step.
7 CONCLUSIONS
An XACML policy for distributed applications might
be aggregated from multiple stakeholders and could
be managed by several administrators. Therefore, it
may contain several anomalies, which may lead to
high implementation complexity. In this direction,
we have proposed an approach which is based on
decomposing the policy into clusters before search-
ing anomalies within each cluster. The evaluation re-
sults demonstrate the efficiency of the proposed ap-
proach to detect different types of anomalies. Direc-
tions for future work include the detection of other
type of anomalies, such as inconsistency and similar-
ity anomalies between two aggregated policies. As
well as the resolution of the detected anomalies.
REFERENCES
Anderson, A., Nadalin, A., Parducci, B., Engovatov, D.,
Lockhart, H., Kudo, M., Humenn, P., Godik, S., An-
derson, S., Crocker, S., et al. (2003). extensible access
control markup language (xacml) version 1.0. OASIS.
Benkaouz, Y., Erradi, M., and Freisleben, B. (2016). Work
in progress: K-nearest neighbors techniques for abac
policies clustering. In Proceedings of the 2016 ACM
International Workshop on Attribute Based Access
Control, pages 72–75. ACM.
Bhatia, N. et al. (2010). Survey of nearest neighbor tech-
niques. arXiv preprint arXiv:1007.0085.
Bonatti, P., De Capitani di Vimercati, S., and Samarati, P.
(2002). An algebra for composing access control poli-
cies. ACM Transactions on Information and System
Security (TISSEC), 5(1):1–35.
De Capitani Di Vimercati, S., Foresti, S., Samarati, P., and
Jajodia, S. (2007). Access control policies and lan-
guages. International Journal of Computational Sci-
ence and Engineering, 3(2):94–102.
Guo, S. (2014). Analysis and evaluation of similarity met-
rics in collaborative filtering recommender system.
Master’s thesis, lapland university of applied sciences.
Hu, H., Ahn, G.-J., and Kulkarni, K. (2013). Discovery and
resolution of anomalies in web access control policies.
Dependable and Secure Computing, IEEE Transac-
tions on, 10(6):341–354.
Khoumsi, A., Erradi, M., and Krombi, W. (2016). A formal
basis for the design and analysis of firewall security
policies. Journal of King Saud University-Computer
and Information Sciences.
Lin, D., Rao, P., Ferrini, R., Bertino, E., and Lobo, J.
(2013). A similarity measure for comparing xacml
policies. IEEE Transactions on Knowledge and Data
Engineering, 25(9):1946–1959.
Moffett, J. D. and Sloman, M. S. (1994). Policy conflict
analysis in distributed system management. Journal of
Organizational Computing and Electronic Commerce,
4(1):1–22.
Mourad, A., Tout, H., Talhi, C., Otrok, H., and Yahyaoui,
H. (2015). From model-driven specification to design-
level set-based analysis of xacml policies. Computers
& Electrical Engineering.
Stepien, B. and Felty, A. (2016). Using expert systems
to statically detect” dynamic” conflicts in xacml. In
Availability, Reliability and Security (ARES), 2016
11th International Conference on, pages 127–136.
IEEE.
Yuan, E. and Tong, J. (2005). Attributed based access con-
trol (abac) for web services. In IEEE International
Conference on Web Services (ICWS’05), page 569.