Efficient bottom-up Mining of Attribute Based Access Control Policies

被引:16
|
作者
Talukdar, Tanay [1 ]
Batra, Gunjan [1 ]
Vaidya, Jaideep [1 ]
Atluri, Vijayalakshmi [1 ]
Sural, Shamik [2 ]
机构
[1] Rutgers Business Sch, MSIS Dept, Newark, NJ 08854 USA
[2] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur, W Bengal, India
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
D O I
10.1109/CIC.2017.00051
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute Based Access Control (ABAC) is fast replacing traditional access control models due to its dynamic nature, flexibility and scalability. ABAC is often used in collaborative environments. However, a major hurdle to deploying ABAC is to precisely configure the ABAC policy. In this paper, we present an ABAC mining approach that can automatically discover the appropriate ABAC policy rules. We first show that the ABAC mining problem is equivalent to identifying a set of functional dependencies in relational databases that cover all of the records in a table. We also propose a more efficient algorithm, called ABAC-SRM which discovers the most general policy rules from a set of candidate rules. We experimentally show that ABAC-SRM is accurate and significantly more efficient than the existing state of the art.
引用
收藏
页码:339 / 348
页数:10
相关论文
共 50 条
  • [41] EFFICIENT BOTTOM-UP COMPUTATION OF QUERIES ON STRATIFIED DATABASES
    BALBIN, I
    PORT, GS
    RAMAMOHANARAO, K
    MEENAKSHI, K
    [J]. JOURNAL OF LOGIC PROGRAMMING, 1991, 11 (3-4): : 295 - 344
  • [42] Bottom-up filling optimization for efficient TSV metallization
    Delbos, Elise
    Omnes, Laurent
    Etcheberry, Arnaud
    [J]. MICROELECTRONIC ENGINEERING, 2010, 87 (03) : 514 - 516
  • [43] Bottom-up Model of Visual Saliency: A Viewpoint based on Efficient Coding Hypothesis
    Zhu, Hao
    Han, Biao
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 2136 - 2141
  • [45] An Ontological Template for Context Expressions in Attribute-based Access Control Policies
    Veloudis, Simeon
    Paraskakis, Iraklis
    Petsos, Christos
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 123 - 134
  • [46] Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies
    Thang Bui
    Stoller, Scott D.
    Sharma, Shikhar
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 101 - 119
  • [47] Bottom-up/top-down image parsing by attribute graph grammar
    Han, F
    Zhu, SC
    [J]. TENTH IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1778 - 1785
  • [48] Attribute Assurance for Attribute Based Access Control
    Friedman, Art
    Hu, Vincent C.
    [J]. 2014 IT PROFESSIONAL CONFERENCE (IT PRO), 2014,
  • [49] A balance of bottom-up and top-down in linking climate policies
    Green, Jessica F.
    Sterner, Thomas
    Wagner, Gernot
    [J]. NATURE CLIMATE CHANGE, 2014, 4 (12) : 1064 - 1067
  • [50] Attribute-based Mining Process for the Organization-Based Access Control Model
    Wazan, Ahmad Samer
    Blanc, Gregory
    Debar, Herve
    Garcia-Alfaro, Joaquin
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 421 - 430