Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy 2021
DOI: 10.1145/3422337.3447828
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of ReBAC Policy Mining Feasibility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…-In [3], feasibility of ReBAC policy mining has been investigated for the first time, assuming user to user relations are given by a static relationship graph.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…-In [3], feasibility of ReBAC policy mining has been investigated for the first time, assuming user to user relations are given by a static relationship graph.…”
Section: Related Workmentioning
confidence: 99%
“…Although both ReBAC and ABAC are powerful, flexible and comparable [1] in expressing authorization policies, relying solely on one is often insufficient. An example case will be used in order to compare ABAC policy presented in [4] and ReBAC policy in [3] with the proposed AReBAC policy in Def. 4.…”
Section: Alicementioning
confidence: 99%
See 3 more Smart Citations