Policy Extraction and Optimization with Access Logs for Attribute-based Access Control

被引:0
|
作者
Sun, Wei [1 ]
Li, Long [2 ]
Hu, Ying [3 ]
机构
[1] School of Computer and Information Technology, Xinyang Normal University, Xinyang,464000, China
[2] Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin,541004, China
[3] Department of Electric Engineering, Pacific Gas and Electric Company, San Ramon,94583, United States
来源
Journal of Network Intelligence | 2023年 / 8卷 / 03期
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:932 / 947
相关论文
共 50 条
  • [31] Authorization Recycling in Attribute-Based Access Control
    An, Yan
    Helil, Nurmamat
    [J]. Wireless Communications and Mobile Computing, 2023, 2023
  • [32] Supporting attribute-based access control with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Kamprath, Nora
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 465 - +
  • [33] Attribute-Based Access Control in Web Applications
    Kauser, Sadia
    Rahman, Ayesha
    Khan, Asad Mohammed
    Ahmad, Tameem
    [J]. APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 385 - 393
  • [34] Attribute-Based Access Control for NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 317 - 319
  • [35] ANALYSIS OF THE METHODS FOR ATTRIBUTE-BASED ACCESS CONTROL
    Kalimoldayev, M. N.
    Biyashev, R. G.
    Rog, O. A.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2019, (44): : 43 - 57
  • [36] In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control
    Heutelbeck, Dominic
    Baur, Marc Lucas
    Kluba, Martin
    [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 59 - 70
  • [37] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [38] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
    LeMay, Michael
    Fatemieh, Omid
    Gunter, Carl A.
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214
  • [39] Policy Adaptation in Attribute-Based Access Control for Inter-organizational Collaboration
    Das, Saptarshi
    Sural, Sharnik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 136 - 145
  • [40] Access Control Policy Generation Method Based on Access Control Logs
    Liu Aodi
    Du Xuehui
    Wang Na
    Shan Dibin
    Zhang Liu
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (01) : 324 - 331