2019
DOI: 10.1007/978-3-030-22312-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Automated Extraction of ABAC Constraints from Natural Language Policies

Abstract: Due to the recent trend towards attribute-based access control (ABAC), several studies have proposed constraints specification languages for ABAC. These formal languages enable security architects to express constraints in a precise mathematical notation. However, since manually formulating constraints involves analyzing multiple natural language policy documents in order to infer constraints-relevant information, constraints specification becomes a repetitive, time-consuming and error-prone task. To bridge th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…While policy languages and models were developed [9], [37] that enforce obligation requirements, we also need to consider the effectiveness of NLP approaches that target policy documents. There is also a significant effort to automate rule extraction and management from natural language text [2], [18], [47]. However, as Ravichander et al [40] point out, there are challenges to automating knowledge extraction from policy documents.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…While policy languages and models were developed [9], [37] that enforce obligation requirements, we also need to consider the effectiveness of NLP approaches that target policy documents. There is also a significant effort to automate rule extraction and management from natural language text [2], [18], [47]. However, as Ravichander et al [40] point out, there are challenges to automating knowledge extraction from policy documents.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Consider the following sentence taken from a Policy: "Like most online service providers, we collect information that web browsers, mobile devices, and servers typically make available, including the browser type, IP address, unique device identifiers, language preference, referring site, the date and time of access, operating system, and mobile network information." 2 The word "and" has been used 3 times in the sentence to join multiple clauses. This is a difficult sentence to read.…”
Section: Connective Wordsmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors also propose a scoring method for determining the quality of a policy from a least privilege point of view. [1] proposes a methodology that can extract ABAC constraints in an automated manner from policies expressed in natural language. A constrained policy mining technique has been proposed in [9].…”
Section: Related Workmentioning
confidence: 99%
“…Recent research efforts have been focused on exploring Artificial Intelligence (AI) and Machine Learning (ML) based approaches for developing and managing ABAC authorization systems, ranging from mining ABAC policies from access logs [15,19,21] to extracting such policies using deep learning (DL) algorithms [28] and employing natural language processing (NLP) tools for automating policy development and enforcement [2]. While supervised learning algorithms seem to be an option for inferring ABAC policies from access logs, they suffer from several limitations.…”
Section: Introductionmentioning
confidence: 99%