Mining Attribute-Based Access Control Policies from Logs - LNCS 8566: Data and Applications Security and Privacy XXVIII
Conference Papers Year : 2014

Mining Attribute-Based Access Control Policies from Logs

Abstract

Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the first algorithm for this problem.
Fichier principal
Vignette du fichier
978-3-662-43936-4_18_Chapter.pdf (687.4 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01284862 , version 1 (08-03-2016)

Licence

Identifiers

Cite

Zhongyuan Xu, Scott D. Stoller. Mining Attribute-Based Access Control Policies from Logs. 28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩. ⟨hal-01284862⟩
80 View
356 Download

Altmetric

Share

More