Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3078861.3084163acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
poster

Poster: Constrained Policy Mining in Attribute Based Access Control

Published: 07 June 2017 Publication History

Abstract

In practical access control systems, it is important to enforce an upper bound on the time taken to respond to an access request. This response time is directly influenced by the size (often called the weight) of each of the underlying access control rules. We present a constrained policy mining algorithm which takes an access control matrix as input and generates a set of attribute based access control (ABAC) rules, such that the weight of each rule is not more than a specified value and the sum of weights of all the rules is minimized. Our initial experiments show encouraging results.

References

[1]
Y. Benkaouz, M. Erradi, and B. Freisleben. Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering. ACM Intl. Workshop on ABAC, 72--75.
[2]
M. Cygan, L. Kowalik, and M. Wykurz. Exponential-time Approximation of Weighted Set Cover. Inf. Proc. Let. (2009), 957--961.
[3]
P. Harika, M. Nagajyothi, J. C. John, S. Sural, J. Vaidya, and V. Atluri. Meeting cardinality Constraints in Role Mining. IEEE Trans. Dep. and Sec. Com. (2015), 71--84.
[4]
R. S. Sandhu, J. E. Coyne, H. L. Feinstein, and C. E. Youman. Role-based Access Control Models. IEEE Computer (1996), 38--47.
[5]
D. Servos and S. L. Osborn. Current Research and Open Problems in Attribute-Based Access Control. ACM Comp. Sur. (2017), 1--45.
[6]
Z. Xu and S. D. Stoller. Mining attribute-based access control policies. IEEE Trans. Dep. and Sec. Com. 12, 5 (2015), 533--545.

Cited By

View all
  • (2024)An explainable deep reinforcement learning algorithm for the parameter configuration and adjustment in the consortium blockchainEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.107606129:COnline publication date: 16-May-2024
  • (2024)Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control SystemsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_23(323-337)Online publication date: 26-Jul-2024
  • (2022)Effective Evaluation of Relationship-Based Access Control Policy MiningProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535022(127-138)Online publication date: 7-Jun-2022
  • Show More Cited By

Index Terms

  1. Poster: Constrained Policy Mining in Attribute Based Access Control

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
      June 2017
      276 pages
      ISBN:9781450347020
      DOI:10.1145/3078861
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 June 2017

      Check for updates

      Author Tags

      1. abac
      2. constraint
      3. policy mining
      4. weight

      Qualifiers

      • Poster

      Conference

      SACMAT'17
      Sponsor:

      Acceptance Rates

      SACMAT '17 Abstracts Paper Acceptance Rate 14 of 50 submissions, 28%;
      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)An explainable deep reinforcement learning algorithm for the parameter configuration and adjustment in the consortium blockchainEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.107606129:COnline publication date: 16-May-2024
      • (2024)Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control SystemsICT Systems Security and Privacy Protection10.1007/978-3-031-65175-5_23(323-337)Online publication date: 26-Jul-2024
      • (2022)Effective Evaluation of Relationship-Based Access Control Policy MiningProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535022(127-138)Online publication date: 7-Jun-2022
      • (2022)Contemporaneous Update and Enforcement of ABAC PoliciesProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535021(31-42)Online publication date: 7-Jun-2022
      • (2022)Learning Relationship-Based Access Control Policies from Black-Box SystemsACM Transactions on Privacy and Security10.1145/351712125:3(1-36)Online publication date: 19-May-2022
      • (2022)Implementation of multi-domain isolation architecture and communication mechanism in LinuxThird International Conference on Computer Science and Communication Technology (ICCSCT 2022)10.1117/12.2661795(41)Online publication date: 29-Dec-2022
      • (2022)Mining Attribute-Based Access Control PoliciesInformation Systems Security10.1007/978-3-031-23690-7_11(186-201)Online publication date: 11-Dec-2022
      • (2021)Incremental Maintenance of ABAC PoliciesProceedings of the Eleventh ACM Conference on Data and Application Security and Privacy10.1145/3422337.3447825(185-196)Online publication date: 26-Apr-2021
      • (2021)Compliance Checking of Collaborative Processes for Sustainable Collaborative NetworkSmart and Sustainable Collaborative Networks 4.010.1007/978-3-030-85969-5_27(301-310)Online publication date: 15-Nov-2021
      • (2020)Policy-Engineering Optimization with Visual Representation and Separation-of-Duty Constraints in Attribute-Based Access ControlFuture Internet10.3390/fi1210016412:10(164)Online publication date: 27-Sep-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media