2014
DOI: 10.1007/978-3-319-07076-6_6
|View full text |Cite
|
Sign up to set email alerts
|

Towards Attribute-Based Access Control Policy Engineering Using Risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…A constrained policy mining technique has been proposed in [9]. In [18], the authors have proposed a policy engineering approach that considers the risk associated with the improper use and possible abuse of a permitted access to a user. Lawal and Krishnan have proposed an approach for policy administration in ABAC via policy review [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A constrained policy mining technique has been proposed in [9]. In [18], the authors have proposed a policy engineering approach that considers the risk associated with the improper use and possible abuse of a permitted access to a user. Lawal and Krishnan have proposed an approach for policy administration in ABAC via policy review [19].…”
Section: Related Workmentioning
confidence: 99%
“…The process of creating a policy for implementing ABAC is known as policy engineering. Policy engineering can be carried out in two ways -top-down [22] and bottom-up [9], [18], [20], [30]. Bottom-up policy engineering is also termed as policy mining.…”
Section: Introductionmentioning
confidence: 99%
“…Xu and Stoller [19] propose a framework for mining parameterized role-based policies that supports a basic version of ABAC where roles are considered as subject attributes. Krautsevich et al [10] construct an ABAC policy by defining values of attributes while deciding an access.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the benefits and the existing ABAC solutions in the market, ABAC requires meticulous planning, and establishing attribute-based rules from scratch is only workable in small scenarios, since it is imperative to analyze all the valid and invalid value combinations in the system [6]. Therefore, policy mining has been identified as the key for achieving widespread adoption of the attribute-based approach [7].…”
Section: Introductionmentioning
confidence: 99%