Synthesizing Access Control Policies Using Large Language Models

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Cloud compute systems allow administrators to write access control policies that govern access to private data. While policies are written in convenient languages, such as AWS Identity and Access Management Policy Language, manually written policies often become complex and error prone. In this paper, we investigate whether and how well Large Language Models (LLMs) can be used to synthesize access control policies. Our investigation focuses on the task of taking an access control request specification and zero-shot prompting LLMs to synthesize a well-formed access control policy which correctly adheres to the request specification. We consider two scenarios, one which the request specification is given as a concrete list of requests to be allowed or denied, and another in which a natural language description is used to specify sets of requests to be allowed or denied. We then argue that for zero-shot prompting, more precise and structured prompts using a syntax based approach are necessary and experimentally show preliminary results validating our approach.

Original languageEnglish
Title of host publicationProceedings - 2025 IEEE/ACM International Workshop on Natural Language-Based Software Engineering, NLBSE 2025
Pages13-16
Number of pages4
ISBN (Electronic)9798331538644
DOIs
StatePublished - 2025
Event2025 IEEE/ACM International Workshop on Natural Language-Based Software Engineering, NLBSE 2025 - Ottawa, Canada
Duration: 27 Apr 2025 → …

Publication series

NameProceedings - 2025 IEEE/ACM International Workshop on Natural Language-Based Software Engineering, NLBSE 2025

Conference

Conference2025 IEEE/ACM International Workshop on Natural Language-Based Software Engineering, NLBSE 2025
Country/TerritoryCanada
CityOttawa
Period27/04/25 → …

Keywords

  • access control policy
  • large language models
  • policy synthesis
  • verification

Fingerprint

Dive into the research topics of 'Synthesizing Access Control Policies Using Large Language Models'. Together they form a unique fingerprint.

Cite this