Policy Extraction and Optimization with Access Logs for Attribute-based Access Control

被引:0
|
作者
Sun, Wei [1 ]
Li, Long [2 ]
Hu, Ying [3 ]
机构
[1] School of Computer and Information Technology, Xinyang Normal University, Xinyang,464000, China
[2] Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin,541004, China
[3] Department of Electric Engineering, Pacific Gas and Electric Company, San Ramon,94583, United States
来源
Journal of Network Intelligence | 2023年 / 8卷 / 03期
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:932 / 947
相关论文
共 50 条
  • [1] An Automatic Attribute-Based Access Control Policy Extraction From Access Logs
    Karimi, Leila
    Aldairi, Maryam
    Joshi, James
    Abdelhakim, Mai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2304 - 2317
  • [2] ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST
    Quan, Shan
    Zhao, Yongdan
    Helil, Nurmamat
    [J]. COMPUTING AND INFORMATICS, 2023, 42 (03) : 615 - 650
  • [3] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [4] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [5] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [6] Attribute-based lightweight reconfigurable access control policy
    Xie, Rongna
    Li, Hui
    Shi, Guozhen
    Guo, Yunchuan
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
  • [7] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [8] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [9] Policy Extraction and Optimization with Top-down and Bottom-up Approaches for Attribute-based Access Control
    Sun, Wei
    Lu, Jun
    Wang, Mengzhao
    [J]. International Journal of Network Security, 2024, 26 (04) : 535 - 545
  • [10] Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109