2018
DOI: 10.1007/978-3-319-95729-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Towards Adaptive Access Control

Abstract: Access control systems are nowadays the first line of defence of modern IT systems. However, their effectiveness is often compromised by policy miscofigurations that can be exploited by insider threats. In this paper, we present an approach based on machine learning to refine attribute-based access control policies in order to reduce the risks of users abusing their privileges. Our approach exploits behavioral patterns representing how users typically access resources to narrow the permissions granted to users… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…Argento et al [21] proposed an ML-based access control mechanism as the first line of defense, relying on users' behavioural patterns such as data volume and access frequency. Outchakoucht et al [22] introduced a reinforcement-learningbased access control approach tailored for distributed IoT environments.…”
Section: Ml-driven Access Control Approachesmentioning
confidence: 99%
“…Argento et al [21] proposed an ML-based access control mechanism as the first line of defense, relying on users' behavioural patterns such as data volume and access frequency. Outchakoucht et al [22] introduced a reinforcement-learningbased access control approach tailored for distributed IoT environments.…”
Section: Ml-driven Access Control Approachesmentioning
confidence: 99%
“…Baumgrass (2011) and Zhang et al (2013) both use access logs to identify missing or excessive UPAs and adjust roles accordingly. Argento et al (2018) use access logs to identify excessive permission assignments and update ABAC policies. Groll et al (2021) propose to use negative access review decisions, i.e.…”
Section: Reduce Excessive and Missing Upasmentioning
confidence: 99%
“…Their proposed approach learns authorization rules from data manipulation patterns and enforces such rules to prevent unauthorized accesses before code fixes are deployed. Argento et al [3] propose an adaptive access control model that exploits users' behavioral patterns to narrow their permissions when anomalous behavior is detected.…”
Section: Adaptive Authorization Modelsmentioning
confidence: 99%