Efficient bottom-up Mining of Attribute Based Access Control Policies

被引:16
|
作者
Talukdar, Tanay [1 ]
Batra, Gunjan [1 ]
Vaidya, Jaideep [1 ]
Atluri, Vijayalakshmi [1 ]
Sural, Shamik [2 ]
机构
[1] Rutgers Business Sch, MSIS Dept, Newark, NJ 08854 USA
[2] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur, W Bengal, India
基金
美国国家科学基金会; 美国国家卫生研究院;
关键词
D O I
10.1109/CIC.2017.00051
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute Based Access Control (ABAC) is fast replacing traditional access control models due to its dynamic nature, flexibility and scalability. ABAC is often used in collaborative environments. However, a major hurdle to deploying ABAC is to precisely configure the ABAC policy. In this paper, we present an ABAC mining approach that can automatically discover the appropriate ABAC policy rules. We first show that the ABAC mining problem is equivalent to identifying a set of functional dependencies in relational databases that cover all of the records in a table. We also propose a more efficient algorithm, called ABAC-SRM which discovers the most general policy rules from a set of candidate rules. We experimentally show that ABAC-SRM is accurate and significantly more efficient than the existing state of the art.
引用
收藏
页码:339 / 348
页数:10
相关论文
共 50 条
  • [1] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [2] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [3] Mining Least Privilege Attribute Based Access Control Policies
    Sanders, Matthew W.
    Yue, Chuan
    [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 404 - 416
  • [4] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [5] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [6] VisMAP: Visual Mining of Attribute-Based Access Control Policies
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Rigoll, Gerhard
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
  • [7] An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies
    Karimi, Leila
    Joshi, James
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1427 - 1436
  • [8] BUXMiner: An efficient bottom-up approach to mining XML query patterns
    Bei, Yijun
    Chen, Gang
    Dong, Jinxiang
    [J]. ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2007, 4505 : 709 - +
  • [9] A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies
    Narouei, Masoud
    Takabi, Hassan
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 489 - 506
  • [10] Representing Attribute Based Access Control Policies in OWL
    Sharma, Nitin Kumar
    Joshi, Anupam
    [J]. 2016 IEEE TENTH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2016, : 332 - 335