Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3363191
|View full text |Cite
|
Sign up to set email alerts
|

Towards Continuous Access Control Validation and Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(22 citation statements)
references
References 39 publications
1
13
0
Order By: Relevance
“…Recently, a few studies investigated automated techniques or engineering practices to enhance configuration checking code [16], diagnosability [104], interface [45], security [14], [105], [106], configuration data analysis [107], configuration libraries [108], [109], and correlations or coupling in configuration and code [110]- [112]. Our work corroborates and complements the aforementioned work from the perspective of software evolution.…”
Section: Related Worksupporting
confidence: 78%
“…Recently, a few studies investigated automated techniques or engineering practices to enhance configuration checking code [16], diagnosability [104], interface [45], security [14], [105], [106], configuration data analysis [107], configuration libraries [108], [109], and correlations or coupling in configuration and code [110]- [112]. Our work corroborates and complements the aforementioned work from the perspective of software evolution.…”
Section: Related Worksupporting
confidence: 78%
“…Francisca, et al [9] reviewed applications of ML in object detection and classifi cation. Mohamed Alhoseni, et al [10] proposed a new IoT-enabled Optimal-Deep-Learning based Convolutional-Neural-Network (ODL-CNN) to assist in the process of suspect identifi cation. The Improved Elephant Herd Optimization (IEHO) algorithm was used to optimise the hyper parameters of the DL-CNN model.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The framework achieves good results in both real logs and synthetic logs. Xiang et al [7] propose time changing decision tree to process the existing access logs. The time changing decision tree records and continuously monitors the current access control constraints of the system.…”
Section: 2mentioning
confidence: 99%
“…Access control policies are the rules which are used to make an Allow or Deny decision for an access request [6]. Access control policies are mainly configured by experts or generated by policy mining [7,8]. In policy mining, logs are used as input of policy mining algorithm, to automatically mine access control policies.…”
Section: Introductionmentioning
confidence: 99%