Mining Attribute-Based Access Control Policies

被引:1
|
作者
Davari, Maryam [1 ]
Zulkernine, Mohammad [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
来源
基金
加拿大自然科学与工程研究理事会;
关键词
Attribute-Based Access Control; Policy mining; Constraints; Separation of Duty constraints; Machine learning; ALGORITHM;
D O I
10.1007/978-3-031-23690-7_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The flexibility feature of Attribute-Based Access Control (ABAC) makes it a powerful access control model for supporting the authorization demands of complex and dynamic systems. However, the migration from traditional access control models to the ABAC model is challenging. One promising approach to ease the burden of policy migration is policy mining. This paper proposes a bottom-up policy mining approach to automatically extract policies by mining access logs. The approach also employs machine learning techniques to learn ABAC policies. Real and synthetic data sets are employed to evaluate the approach. The experimental results demonstrate that our approach can generate ABAC policy rules efficiently.
引用
收藏
页码:186 / 201
页数:16
相关论文
共 50 条
  • [31] Attribute-Based Access Control for NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 317 - 319
  • [32] ANALYSIS OF THE METHODS FOR ATTRIBUTE-BASED ACCESS CONTROL
    Kalimoldayev, M. N.
    Biyashev, R. G.
    Rog, O. A.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2019, (44): : 43 - 57
  • [33] Supporting attribute-based access control with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Kamprath, Nora
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 465 - +
  • [34] Attribute-Based Access Control in Web Applications
    Kauser, Sadia
    Rahman, Ayesha
    Khan, Asad Mohammed
    Ahmad, Tameem
    [J]. APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 385 - 393
  • [35] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [36] Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework
    Bennett, Phillipa
    Ray, Indrakshi
    France, Robert
    [J]. INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 79 - 97
  • [37] ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations
    Silva, Edelberto Franco
    Muchaluat-Saade, Debora Christina
    Fernandes, Natalia Castro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1 - 17
  • [38] A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures
    Kotenko, Igor
    Saenko, Igor
    Levshun, Dmitry
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19), 2020, 1156 : 165 - 175
  • [39] Efficient bottom-up Mining of Attribute Based Access Control Policies
    Talukdar, Tanay
    Batra, Gunjan
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Sural, Shamik
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 339 - 348
  • [40] An Attribute-based Access Control with Flexible Attribute Change in Open Systems
    Ye, Tao
    Cai, Yongquan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT 2017), 2017, 70 : 101 - 105