Mining Attribute-Based Access Control Policies

被引:1
|
作者
Davari, Maryam [1 ]
Zulkernine, Mohammad [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
来源
基金
加拿大自然科学与工程研究理事会;
关键词
Attribute-Based Access Control; Policy mining; Constraints; Separation of Duty constraints; Machine learning; ALGORITHM;
D O I
10.1007/978-3-031-23690-7_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The flexibility feature of Attribute-Based Access Control (ABAC) makes it a powerful access control model for supporting the authorization demands of complex and dynamic systems. However, the migration from traditional access control models to the ABAC model is challenging. One promising approach to ease the burden of policy migration is policy mining. This paper proposes a bottom-up policy mining approach to automatically extract policies by mining access logs. The approach also employs machine learning techniques to learn ABAC policies. Real and synthetic data sets are employed to evaluate the approach. The experimental results demonstrate that our approach can generate ABAC policy rules efficiently.
引用
收藏
页码:186 / 201
页数:16
相关论文
共 50 条
  • [1] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [2] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [3] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [4] VisMAP: Visual Mining of Attribute-Based Access Control Policies
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Rigoll, Gerhard
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
  • [5] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [6] Evolutionary Inference of Attribute-Based Access Control Policies
    Medvet, Eric
    Bartoli, Alberto
    Carminati, Barbara
    Ferrari, Elena
    [J]. EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
  • [7] A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies
    Narouei, Masoud
    Takabi, Hassan
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 489 - 506
  • [8] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [9] Specification and Analysis of Attribute-Based Access Control Policies: An Overview
    Xu, Dianxiang
    Zhang, Yunpeng
    [J]. 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
  • [10] Attribute-based access control with hidden policies and hidden credentials
    Frikken, Keith
    Atallah, Mikhail
    Li, Jiangtao
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (10) : 1259 - 1270