Proceedings of the 25th ACM Symposium on Access Control Models and Technologies 2020
DOI: 10.1145/3381991.3395614
|View full text |Cite
|
Sign up to set email alerts
|

Active Learning of Relationship-Based Access Control Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…The latter suggests also learning from access enforcement, except in the somewhat different situation that the policy impacts particular entities, e.g., users in a social network, to whom the policy is not made explicit. The more recent work of Iyer and Masoumzadeh [12,13] leverages these motivations to then construct an approach to learning a policy in such "black box" settings, i.e., from information that is generated during access enforcement.…”
Section: The Learning Problemmentioning
confidence: 99%
“…The latter suggests also learning from access enforcement, except in the somewhat different situation that the policy impacts particular entities, e.g., users in a social network, to whom the policy is not made explicit. The more recent work of Iyer and Masoumzadeh [12,13] leverages these motivations to then construct an approach to learning a policy in such "black box" settings, i.e., from information that is generated during access enforcement.…”
Section: The Learning Problemmentioning
confidence: 99%
“…Iyer et al [35] proposed a ReBAC mining algorithm in evolving systems for mining graph transitions. The authors later proposed a method for active learning [36] of ReBAC policies from a black-box access control decision engine using authorization and equivalence queries. A universal access control policy mining, called Unicorn, was proposed by Cotrini et al [18], which builds policies in a class of access control models including RBAC, ABAC, and ReBAC.…”
Section: Related Workmentioning
confidence: 99%
“…Iyer et al [16] present an algorithm for active learning of ReBAC policies from a black-box access control decision engine, using authorization queries and equivalence queries. The algorithm is assumed to have access to complete information about attributes and relationships.…”
Section: Related Work On Rebac Policy Miningmentioning
confidence: 99%
“…policy learning) algorithms have the potential to greatly reduce this cost, by automatically producing a draft high-level policy from existing lower-level data, such as access control lists or access logs. There is a substantial amount of research on role mining [21,10] and a small but growing literature on ABAC policy mining [25,24,20,22,10,9,14,17,8,19], and ReBAC policy mining [4,5,6,3,15,2,16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation