Efficient bottom-up Mining of Attribute Based Access Control Policies

被引:17
|
作者
Talukdar, Tanay [1 ]
Batra, Gunjan [1 ]
Vaidya, Jaideep [1 ]
Atluri, Vijayalakshmi [1 ]
Sural, Shamik [2 ]
机构
[1] Rutgers Business Sch, MSIS Dept, Newark, NJ 08854 USA
[2] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur, W Bengal, India
基金
美国国家科学基金会; 美国国家卫生研究院;
关键词
D O I
10.1109/CIC.2017.00051
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute Based Access Control (ABAC) is fast replacing traditional access control models due to its dynamic nature, flexibility and scalability. ABAC is often used in collaborative environments. However, a major hurdle to deploying ABAC is to precisely configure the ABAC policy. In this paper, we present an ABAC mining approach that can automatically discover the appropriate ABAC policy rules. We first show that the ABAC mining problem is equivalent to identifying a set of functional dependencies in relational databases that cover all of the records in a table. We also propose a more efficient algorithm, called ABAC-SRM which discovers the most general policy rules from a set of candidate rules. We experimentally show that ABAC-SRM is accurate and significantly more efficient than the existing state of the art.
引用
收藏
页码:339 / 348
页数:10
相关论文
共 50 条
  • [1] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [2] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [3] Mining Least Privilege Attribute Based Access Control Policies
    Sanders, Matthew W.
    Yue, Chuan
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 404 - 416
  • [4] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [5] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [6] VisMAP: Visual Mining of Attribute-Based Access Control Policies
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Rigoll, Gerhard
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
  • [7] Policy Extraction and Optimization with Top-down and Bottom-up Approaches for Attribute-based Access Control
    Sun, Wei
    Lu, Jun
    Wang, Mengzhao
    International Journal of Network Security, 2024, 26 (04) : 535 - 545
  • [8] An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies
    Karimi, Leila
    Joshi, James
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1427 - 1436
  • [9] BUXMiner: An efficient bottom-up approach to mining XML query patterns
    Bei, Yijun
    Chen, Gang
    Dong, Jinxiang
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 709 - +
  • [10] Parallel Concept Computing Based on Bottom-Up Decomposition of Attribute Topology
    Zhang T.
    Bai D.-H.
    Li H.
    Zhang, Tao (zhtao@ysu.edu.cn), 1600, Chinese Academy of Sciences (28): : 3129 - 3145