2021
DOI: 10.48550/arxiv.2111.07060
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

PAMMELA: Policy Administration Methodology using Machine Learning

Abstract: In recent years, Attribute-Based Access Control (ABAC) has become quite popular and effective for enforcing access control in dynamic and collaborative environments. Implementation of ABAC requires the creation of a set of attribute-based rules which cumulatively form a policy. Designing an ABAC policy ab initio demands a substantial amount of effort from the system administrator. Moreover, organizational changes may necessitate the inclusion of new rules in an already deployed policy. In such a case, re-minin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 19 publications
0
0
0
Order By: Relevance
“…Used in # of studies Percentage SVM [51], [39], [56], [65], [46], [64], [40], [59], [38], [74], [8], [75], [62], [76], [77], [37] 16 25 % RF [50], [41], [44], [26], [64], [29], [59], [60], [10], [33], [34], [13], [37], [69] 14 22 % DT [9], [42], [25], [71], [72], [49], [66], [33], [77] 9 14 % KNN [41], [45] , [46], [66], [59], [10] [8], [77], [43], [70], [73], S15, [53],…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Used in # of studies Percentage SVM [51], [39], [56], [65], [46], [64], [40], [59], [38], [74], [8], [75], [62], [76], [77], [37] 16 25 % RF [50], [41], [44], [26], [64], [29], [59], [60], [10], [33], [34], [13], [37], [69] 14 22 % DT [9], [42], [25], [71], [72], [49], [66], [33], [77] 9 14 % KNN [41], [45] , [46], [66], [59], [10] [8], [77], [43], [70], [73], S15, [53],…”
Section: Methodsmentioning
confidence: 99%
“…Used in # of studies Percentage ABAC [23], [24], [25], [26], [12], [27], [28], [29], [10], [30], [31], [32], [33], [34], [13], [35], [36] and MLBAC were each used in one study (2%). Some studies may have employed multiple access control models, such as [25], which utilized both ABAC and ReBAC.…”
Section: Ac Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [16] use a Long-Short Term Memory (LSTM) network to extract ABAC attributes from natural language policies. PAMMELA [17] addresses the problem of administration of traditional systems powered by ML. Implementing and comparing various models for ABAC policy administration, creating new rules, and extending existing ones based on change requests.…”
Section: Related Workmentioning
confidence: 99%