Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies 2017
DOI: 10.1145/3078861.3078874
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Top-down Policy Engineering Framework for Attribute-based Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…Deep learning was used to identify relevant attributes [1] to mine ABAC policies from natural language. Other methods including classification trees [13], deep recurrent neural network (RNN) [53], K-Nearest Neighbor (KNN) [20], Decision Tree [8,9,71] and Restricted Boltzmann Machine (RBM) model [50] have also been used to mine ABAC policy. The first unsupervised learning-based ABAC mining method used k-modes clustering to mine rules from historical operation data [40].…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning was used to identify relevant attributes [1] to mine ABAC policies from natural language. Other methods including classification trees [13], deep recurrent neural network (RNN) [53], K-Nearest Neighbor (KNN) [20], Decision Tree [8,9,71] and Restricted Boltzmann Machine (RBM) model [50] have also been used to mine ABAC policy. The first unsupervised learning-based ABAC mining method used k-modes clustering to mine rules from historical operation data [40].…”
Section: Related Workmentioning
confidence: 99%
“…In the context of deployment of ABAC in organizations, there is some existing work on standardization [12], policy engineering [18] [10] [23] [9], etc. Moreover, procedures have been developed for enabling organizations to migrate to ABAC from other access control models [14].…”
Section: Related Workmentioning
confidence: 99%
“…They also include the environment attributes while mining the policy. Narouei et al [14] propose a top-down policy engineering framework for ABAC that extracts policies from unrestricted natural language documents using a deep recurrent neural network.…”
Section: Related Workmentioning
confidence: 99%