ing on paths, flexible path length, or incomplete
path specifications) and a property graph holding all
authorization-relevant data, which we call source-
subset graph. The proof-of-concept prototype im-
plements the latest language and architecture of
XACML4G and a case for a real knowledge graph
(RQ3). The XML schemas are further extended to
define the authorization-relevant data, support flexi-
ble path specification in the policy, and specify edges
as resources. To enforce the XACML4G language,
extensibility points in the PIP and proprietary exten-
sions of the XACML architecture (i.e., context han-
dler, PAP, and PDP) are implemented. The proto-
type extends the open source XACML implementa-
tion Balana and uses Neo4j along with Cypher for
a datastore-independent enforcement. No more pre-
processing of policies and requests is required. Com-
pared to our previous work and a statically imple-
mented XACML prototype, our current prototype has
better performance and stability in evaluating paths
with different lengths. Additionally, the current ap-
proach no longer introduces constant overhead.
This work highlighted further challenges. Patterns
are now evaluated within the XACML model as con-
ditions, but no pattern-related errors can be detected.
Moreover, multiple labels on vertices and edges have
to be considered to match with real-world graph mod-
els. The performance comparison can be improved by
excluding influencing factors, such as different graph
database systems for policy enforcement.
ACKNOWLEDGMENTS
The research reported in this paper has been partly
supported by the LIT Secure and Correct Systems Lab
funded by the State of Upper Austria. The work was
also funded within the FFG BRIDGE project KnoP-
2D (grant no. 871299).
REFERENCES
Ahmed, T., Sandhu, R., and Park, J. (2017). Classifying
and comparing attribute-based and relationship-based
access control. In Proceedings of the 7th Conference
on Data and Application Security and Privacy, CO-
DASPY ’17, page 59–70, New York, USA. ACM.
Angles, R., Arenas, M., Barcelo, P., Boncz, P., Fletcher,
G., Gutierrez, C., Lindaaker, T., Paradies, M., Plan-
tikow, S., Sequeda, J., van Rest, O., and Voigt, H.
(2018). G-core: A core for future graph query lan-
guages. In Proceedings of the 2018 International Con-
ference on Management of Data, SIGMOD ’18, page
1421–1432, New York, NY, USA. ACM.
Braun, U., Shinnar, A., and Seltzer, M. (2008). Securing
provenance. In Proceedings of the 3rd Conference on
Hot Topics in Security, HOTSEC’08, USA. USENIX
Association.
Cheng, Y., Park, J., and Sandhu, R. (2016). An access con-
trol model for online social networks using user-to-
user relationships. IEEE Transactions on Dependable
and Secure Computing, 13(4):424–436.
Clark, S., Yakovets, N., Fletcher, G., and Zannone, N.
(2022). Relog: A unified framework for relationship-
based access control over graph databases. In Data
and Applications Security and Privacy XXXVI: 36th
Annual IFIP WG 11.3 Conference, DBSec 2022,
Newark, NJ, USA, July 18–20, 2022, Proceedings,
page 303–315, Berlin, Heidelberg. Springer-Verlag.
Fong, P. W. (2011). Relationship-based access control: Pro-
tection model and policy language. In Proceedings of
the First ACM Conference on Data and Application
Security and Privacy, CODASPY ’11, page 191–202,
New York, NY, USA. ACM.
Hevner, A. R., March, S. T., Park, J., and Ram, S. (2004).
Design science in information systems research. MIS
Q, 28(1):75–105.
Hu, V. C., Ferraiolo, D. F., Chandramouli, R., and Kuhn,
D. R. (2017). Attribute-Based Access Control. Artech
House information security and privacy series. Artech
House, Boston.
H
¨
ubscher, G., Geist, V., Auer, D., Ekelhart, A., Mayer, R.,
Nadschl
¨
ager, S., and K
¨
ung, J. (2021). Graph-based
managing and mining of processes and data in the do-
main of intellectual property. Information Systems,
106:101844.
Jøsang, A. (2017). A consistent definition of authorization.
In Livraga, G. and Mitchell, C., editors, Security and
Trust Management, pages 134–144, Cham. Springer
International Publishing.
Lorch, M., Adams, D. B., Kafura, D., Koneni, M., Rathi, A.,
and Shah, S. (2003). The prima system for privilege
management, authorization and enforcement in grid
environments. In First Latin American Web Congress,
pages 109–116, Phoenix, AZ, USA. IEEE.
Mohamed, A., Auer, D., Hofer, D., and K
¨
ung, J. (2021a).
Extended authorization policy for graph-structured
data. SN Computer Science, 2(5):1–18.
Mohamed, A., Auer, D., Hofer, D., and K
¨
ung, J. (2021b).
Extended xacml language and architecture for access
control in graph-structured data. In The 23rd Interna-
tional Conference on Information Integration and Web
Intelligence, iiWAS2021, page 367–374, New York,
NY, USA. Association for Computing Machinery.
van Rest, O., Hong, S., Kim, J., Meng, X., and Chafi, H.
(2016). Pgql: A property graph query language. In
Proceedings of the Fourth International Workshop on
Graph Data Management Experiences and Systems,
GRADES ’16, New York, NY, USA. ACM.
Wu, J., Leangsuksun, C. B., Rampure, V., and Ong, H.
(2006). Policy-based access control framework for
grid computing. In 6th IEEE International Symposium
on Cluster Computing and the Grid (CCGRID’06),
volume 1, pages 391–394, Singapore. IEEE.
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement
449