2020
DOI: 10.1007/978-3-030-65610-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 16 publications
0
10
0
2
Order By: Relevance
“…Deep learning was used to identify relevant attributes [1] to mine ABAC policies from natural language. Other methods including classification trees [13], deep recurrent neural network (RNN) [53], K-Nearest Neighbor (KNN) [20], Decision Tree [8,9,71] and Restricted Boltzmann Machine (RBM) model [50] have also been used to mine ABAC policy. The first unsupervised learning-based ABAC mining method used k-modes clustering to mine rules from historical operation data [40].…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning was used to identify relevant attributes [1] to mine ABAC policies from natural language. Other methods including classification trees [13], deep recurrent neural network (RNN) [53], K-Nearest Neighbor (KNN) [20], Decision Tree [8,9,71] and Restricted Boltzmann Machine (RBM) model [50] have also been used to mine ABAC policy. The first unsupervised learning-based ABAC mining method used k-modes clustering to mine rules from historical operation data [40].…”
Section: Related Workmentioning
confidence: 99%
“…Neste trabalho, vamos comparar o método proposto (A.Dec+Gen) com uma abordagem que utiliza árvore de decisão tradicional (A.Dec), similar ao trabalho [Bui and Stoller 2020], porém aplicada para o ABAC. Os experimentos realizados para avaliar o desempenho de ambos métodos foram realizados através de simulações computacionais.…”
Section: Experimentosunclassified
“…Em outros métodos, minera-se ACPs somente quando o registro possui uma grande quantidade de situações de acesso, pois, caso con-trário, o método apresentará ACPs regras muito específicas e incapazes de generalizar situações [Xu and Stoller 2014]. Por fim, em outro extremo, há técnicas excessivamente permissivas, o que pode gerar permissões de acessos errôneos e sem qualquer evidência no registro que coloca em risco a segurança do sistema [Bui and Stoller 2020].…”
Section: Introductionunclassified
“…Although the policy specification language in this paper is very different from [2,9], these two works are relevant related work. In [2], an approach to mine ABAC and ReBAC policies has been proposed where access control lists and incomplete information about entities are given.…”
Section: Related Workmentioning
confidence: 99%
“…Although the policy specification language in this paper is very different from [2,9], these two works are relevant related work. In [2], an approach to mine ABAC and ReBAC policies has been proposed where access control lists and incomplete information about entities are given. A few significant points about [2] are i) the proposed algorithm prefers the context of ReBAC mining because ReBAC is more general than ABAC, ii) entity ids are allowed to be used (which makes the generated policy less general), and iii) there is a policy quality metric available.…”
Section: Related Workmentioning
confidence: 99%