Proceedings of the 24th ACM Symposium on Access Control Models and Technologies 2019
DOI: 10.1145/3322431.3325419
|View full text |Cite
|
Sign up to set email alerts
|

Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…Graph based access control models [68,81,91] have used graphs to express hierarchical nature of user roles. Graph based frameworks have also been used to augment role based access control (RBAC) [69,70] and relation based access control (ReBAC) [60] systems and have application in operating systems. will.iam leverages the well-researched concepts of graph based access control to propose flexible and dynamic access control model for serverless platforms.…”
Section: Related Workmentioning
confidence: 99%
“…Graph based access control models [68,81,91] have used graphs to express hierarchical nature of user roles. Graph based frameworks have also been used to augment role based access control (RBAC) [69,70] and relation based access control (ReBAC) [60] systems and have application in operating systems. will.iam leverages the well-researched concepts of graph based access control to propose flexible and dynamic access control model for serverless platforms.…”
Section: Related Workmentioning
confidence: 99%
“…More detailed descriptions of these policies are available in [2]. The ABAC or ReBAC versions of these policies, or variants of them, have been used as benchmarks in several papers on policy mining, including [20,5,14,17,15,2].…”
Section: Datasetsmentioning
confidence: 99%
“…policy learning) algorithms have the potential to greatly reduce this cost, by automatically producing a draft high-level policy from existing lower-level data, such as access control lists or access logs. There is a substantial amount of research on role mining [21,10] and a small but growing literature on ABAC policy mining [25,24,20,22,10,9,14,17,8,19], and ReBAC policy mining [4,5,6,3,15,2,16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…We chose ORAL as the basis for our policy language to facilitate comparison with existing work. ORAL [BSL17,BSL18,BSL19b,BSL19a] or a similar language [IM19] is used in all of the published work on ReBAC policy mining. The similarity of Iyer et al's policy language to ORAL is reflected in the fact that the policies used in their experiments are translations of parts of the ORAL policies used in [BSL19b].…”
Section: Introductionmentioning
confidence: 99%