
curity expert interviews.
The results offer insights into the security strength
of the evaluated attributes, helping with creating se-
cure access policies. In terms of user attributes,
Password Authentication with high implementation
strength emerged as the most robust against compro-
mise, followed by Device Usage. Among device at-
tributes, Certificate Authentication exhibited the high-
est security strength, closely followed User Usage.
These findings enable a direct evaluation of the re-
sistance of ABAC policies to spoofing attacks. Based
on our case study results, policies incorporating the
aforementioned four attributes are less vulnerable to
such attacks. In TBAC systems, this information can
guide the weighting of attributes, suggesting assign-
ing the highest weights to these four attributes.
For future work, we aim to conduct more in-depth
analyses and interviews with security experts to over-
come the framework’s current limitation of relying
on single experts’ opinions when assessing attribute
feasibility levels. Our goal is to establish a general
and unbiased baseline for the feasibility levels of at-
tribute compromise, taking into account specific at-
tacker skills. Additionally, we plan to expand the risk
assessment to further attributes like passkeys.
REFERENCES
Bradatsch, L., Miroshkin, O., Trkulja, N., and Kargl, F.
(2023). Zero trust score-based network-level access
control in enterprise networks. http://arxiv.org/abs/
2402.08299.
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A.,
Sastry, S., et al. (2009). Challenges for securing cyber
physical systems. In Workshop on future directions in
cyber-physical systems security, number 1. Citeseer.
C
´
ardenas, A. A. and Baras, J. S. (2006). Evaluation of clas-
sifiers: Practical considerations for security applica-
tions. In AAAI Workshop on Evaluation Methods for
Machine Learning, pages 409–415.
Chattaraj, D., Saha, S., Bera, B., and Das, A. K. (2020).
On the design of blockchain-based access control
scheme for software defined networks. In IEEE INFO-
COM 2020-IEEE Conference on Computer Commu-
nications Workshops (INFOCOM WKSHPS), pages
237–242. IEEE.
Corman, J. and Etue, D. (2012). Adversary roi: Evaluating
security from the threat actor’s perspective. In Pro-
ceedings of the RSA Conference Europe.
Crampton, J., Morisset, C., and Zannone, N. (2015).
On missing attributes in access control: Non-
deterministic and probabilistic attribute retrieval. In
Proceedings of the 20th ACM Symposium on Access
Control Models and Technologies, pages 99–109.
Dimitrakos, T., Dilshener, T., Kravtsov, A., Marra, A. L.,
Martinelli, F., Rizos, A., Rosetti, A., and Saracino,
A. (2020). Trust Aware Continuous Authorization for
Zero Trust in Consumer Internet of Things. In 2020
IEEE 19th International Conference on Trust, Secu-
rity and Privacy in Computing and Communications
(TrustCom), pages 1801–1812.
Esmaeeli, A. and Shahriari, H. R. (2010). Privacy protection
of grid service requesters through distributed attribute
based access control model. In Advances in Grid and
Pervasive Computing: 5th International Conference,
GPC 2010, Hualien, Taiwan, May 10-13, 2010. Pro-
ceedings 5, pages 573–582. Springer.
Garbis, J. and Chapman, J. W. (2021). Zero Trust Security.
Springer.
Ghate, N., Mitani, S., Singh, T., and Ueda, H. (2021).
Advanced zero trust architecture for automating fine-
grained access control with generalized attribute rela-
tion extraction. IEICE Proceedings Series, 68(C1-5).
Hu, V. C., Ferraiolo, D., Kuhn, R., Friedman, A. R.,
Lang, A. J., Cogdell, M. M., Schnitzer, A., Sandlin,
K., Miller, R., Scarfone, K., et al. (2013). Guide
to attribute based access control (abac) definition
and considerations (draft). NIST special publication,
800(162):1–54.
Mandal, S., Khan, D. A., and Jain, S. (2021). Cloud-based
zero trust access control policy: an approach to sup-
port work-from-home driven by covid-19 pandemic.
New Generation Computing, 39(3):599–622.
Manoj, R. J. and Chandrasekar, D. A. (2014). An enhanced
trust authorization based web services access control
model. Journal of Theoretical and Applied Informa-
tion Technology, 64(2):522–530.
Morisset, C., Willemse, T. A., and Zannone, N. (2018). Ef-
ficient extended abac evaluation. In Proceedings of the
23nd ACM on Symposium on Access Control Models
and Technologies, pages 149–160.
Morisset, C., Willemse, T. A., and Zannone, N. (2019). A
framework for the extended evaluation of abac poli-
cies. Cybersecurity, 2(1):1–21.
OWASP Foundation (2021a). A01:2021-Broken Access
Control. https://owasp.org/Top10/A01
2021-Broken
Access Control/. Accessed: 2023-11-15.
OWASP Foundation (2021b). A07:2021-Identification
and Authentication Failures. https://owasp.org/
Top10/A07 2021-Identification and Authentication
Failures/. Accessed: 2023-11-15.
Papakonstantinou, N., Van Bossuyt, D. L., Linnosmaa, J.,
Hale, B., and O’Halloran, B. (2021). A zero trust hy-
brid security and safety risk analysis method. Journal
of Computing and Information Science in Engineer-
ing, 21(5):050907.
Rocchetto, M. and Tippenhauer, N. O. (2016). On attacker
models and profiles for cyber-physical systems. In
Computer Security–ESORICS 2016: 21st European
Symposium on Research in Computer Security, Her-
aklion, Greece, September 26-30, 2016, Proceedings,
Part II 21, pages 427–449. Springer.
Rose, S., Borchert, O., Mitchell, S., and Connelly, S.
(2020). Zero Trust Architecture. NIST Computer Se-
curity Resource center.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
38