We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capability lists in this regard, and develop a quantitative feel for the performance overheads and storage requirements. We also explore the issues related to preserving safety properties and trust assumptions during this process. We suggest augmentations to policy specifications that can guarantee these properties in spite of dynamic changes to system state. Using the lessons learned from this exercise, we apply these techniques in the design of dynamic access controls for dynamic environments. Categories and Subject Descriptors D.4.6 [Security and Protection]: Access controls General Terms Security, Design, Performance Keywords dynamic access control, access lists, capability lists, comparison, safety, trust
Prasad Naldurg, Roy H. Campbell