Efficient bottom-up Mining of Attribute Based Access Control Policies

被引:16
作者
Talukdar, Tanay [1 ]
Batra, Gunjan [1 ]
Vaidya, Jaideep [1 ]
Atluri, Vijayalakshmi [1 ]
Sural, Shamik [2 ]
机构
[1] Rutgers Business Sch, MSIS Dept, Newark, NJ 08854 USA
[2] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur, W Bengal, India
来源
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC) | 2017年
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
D O I
10.1109/CIC.2017.00051
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute Based Access Control (ABAC) is fast replacing traditional access control models due to its dynamic nature, flexibility and scalability. ABAC is often used in collaborative environments. However, a major hurdle to deploying ABAC is to precisely configure the ABAC policy. In this paper, we present an ABAC mining approach that can automatically discover the appropriate ABAC policy rules. We first show that the ABAC mining problem is equivalent to identifying a set of functional dependencies in relational databases that cover all of the records in a table. We also propose a more efficient algorithm, called ABAC-SRM which discovers the most general policy rules from a set of candidate rules. We experimentally show that ABAC-SRM is accurate and significantly more efficient than the existing state of the art.
引用
收藏
页码:339 / 348
页数:10
相关论文
共 25 条
[1]  
[Anonymous], 2013, J WIRELESS COMMUNICA
[2]  
[Anonymous], MTR2997 MITR CORP
[3]  
[Anonymous], 1979, COMPUTERS INTRACTABI
[4]   Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering [J].
Benkaouz, Yahya ;
Erradi, Mohammed ;
Freisleben, Bernd .
ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, :72-75
[5]  
Blundo C., 2010, Proceedings of the 2010 ACM Symposium on Applied Computing, P1958
[6]  
Colantonio A., 2014, IEEE T KNOWL DATA EN, V24, P1120
[7]   A business-driven decomposition methodology for role mining [J].
Colantonio, Alessandro ;
Di Pietro, Roberto ;
Verde, Nino Vincenzo .
COMPUTERS & SECURITY, 2012, 31 (07) :844-855
[8]  
Colantonio A, 2009, INT FED INFO PROC, V297, P376
[9]  
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[10]  
Frank M, 2012, J MACH LEARN RES, V13, P459