2018
DOI: 10.1007/978-3-030-04834-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Policy Engineering in RBAC and ABAC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 80 publications
0
12
0
Order By: Relevance
“…However, the access control currently adopted by the traditional big data platform, such as Hadoop [1][2][3], is based on the static policy specified by the user/user group, and cannot be authorized in groups according to multiple attribute tags of users, let alone the dynamic change of permissions according to the changes of users' attributes, which makes it only suitable for the rights management of a small number of users. The data under the environment of big data is large and dynamic, so the access control list is large and difficult to maintain, the phenomenon of over-authorization and under-authorization is more and more serious, and rights management is complex and difficult [4].…”
Section: Introductionmentioning
confidence: 99%
“…However, the access control currently adopted by the traditional big data platform, such as Hadoop [1][2][3], is based on the static policy specified by the user/user group, and cannot be authorized in groups according to multiple attribute tags of users, let alone the dynamic change of permissions according to the changes of users' attributes, which makes it only suitable for the rights management of a small number of users. The data under the environment of big data is large and dynamic, so the access control list is large and difficult to maintain, the phenomenon of over-authorization and under-authorization is more and more serious, and rights management is complex and difficult [4].…”
Section: Introductionmentioning
confidence: 99%
“…policy learning) algorithms have the potential to greatly reduce this cost, by automatically producing a draft high-level policy from existing lower-level data, such as access control lists or access logs. There is a substantial amount of research on role mining [21,10] and a small but growing literature on ABAC policy mining [25,24,20,22,10,9,14,17,8,19], and ReBAC policy mining [4,5,6,3,15,2,16].…”
Section: Introductionmentioning
confidence: 99%
“…Policy mining algorithms promise to drastically reduce this cost, by automatically produce a "first draft" of a high-level policy from existing lower-level data. There is a substantial amount of research on role mining, surveyed in [8,17], and a small but growing literature on ABAC policy mining [7,14,16,18,22,23], surveyed in [8].…”
Section: Introductionmentioning
confidence: 99%
“…Policy mining algorithms promise to drastically reduce this cost, by automatically produce a "first draft" of a high-level policy from existing lower-level data. There is a substantial amount of research on role mining, surveyed in [8,17], and a small but growing literature on ABAC policy mining [7,14,16,18,22,23], surveyed in [8]. Bui et al proposed a problem of ReBAC policy mining [4,6]: given information about subjects, resources, and other objects, and the set of currently granted permissions, find a ReBAC policy that grants the same permissions using high-level rules.…”
Section: Introductionmentioning
confidence: 99%