Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies 2018
DOI: 10.1145/3205977.3205988
|View full text |Cite
|
Sign up to set email alerts
|

Mining Positive and Negative Attribute-Based Access Control Policy Rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(23 citation statements)
references
References 21 publications
0
20
0
1
Order By: Relevance
“…Molloy et al [37] proposed an approach that mines RBAC policies from existing logs, which reflect access traces of users recorded in the past. Medvet et al [38], Xu and Stoller [39,40], Cotrini et al [41], and Iyer and Masoumzadeh [42] proposed various approaches to mine attribute-based AC (ABAC) policies from existing logs. All these approaches rely only on existing logs; since the latter may only contain a fraction of possible access requests to resources, such approaches could miss many AC policies.…”
Section: Inference Of Ac Policies Using Black-box Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Molloy et al [37] proposed an approach that mines RBAC policies from existing logs, which reflect access traces of users recorded in the past. Medvet et al [38], Xu and Stoller [39,40], Cotrini et al [41], and Iyer and Masoumzadeh [42] proposed various approaches to mine attribute-based AC (ABAC) policies from existing logs. All these approaches rely only on existing logs; since the latter may only contain a fraction of possible access requests to resources, such approaches could miss many AC policies.…”
Section: Inference Of Ac Policies Using Black-box Analysismentioning
confidence: 99%
“…Several approaches [39,42,43] have proposed to mine AC policies from existing AC implementations, often as part of the migration to a modern access control paradigm; for example, Bui et al [44,43] proposed an approach to mine relationship-based AC (ReBAC) policies-an object-oriented extension of ABAC policiesfrom existing access control lists. Slankas and Williams [45] and Xiao et al [46] proposed approaches to extract AC policies from requirement documents written in natural language, using NLP (natural language processing) techniques to extract AC concepts like subjects, actions, and resources.…”
Section: Inference Of Ac Policies Using Black-box Analysismentioning
confidence: 99%
“…An interesting question to consider when integrating Estrela with legacy applications is how to bootstrap policy specification to assist the developers. Policy inference, which is orthogonal to the problem studied in this paper, has been an area of active research where prior works have proposed approaches to mine meaningful policies using logs, traces and program specifications [1,4,5,11,22,24,29,37,[48][49][50][51]. The mined policies can be used to bootstrap the initial set of policies when migrating applications to Estrela.…”
Section: Integration With Legacy Applicationsmentioning
confidence: 99%
“…Later, Gautam et al proposed to model the ABAC mining problem as Constrained Weighted Set Cover Heuristic to better optimize the mined policy (Gautam et al 2017). While Xu and Gautam focused on mining affirmative ABAC authorization rules, Padmavathi et al proposed a more systematic, yet heuristic, approach to mine both positive and negative rules (Iyer and Masoumzadeh 2018). Mocanu et al first designed and evaluated an ABAC candidate rules generation framework using machine learning techniques.…”
Section: Abac Policy Miningmentioning
confidence: 99%