Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes

被引:9
作者
Das, Saptarshi [1 ]
Sural, Shamik [1 ]
Vaidya, Jaideep [2 ]
Atluri, Vijayalakshmi [2 ]
机构
[1] IIT Kharagpur, Kharagpur, W Bengal, India
[2] Rutgers State Univ, New Brunswick, NJ USA
来源
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES | 2018年
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
ABAC; Policy mining; Environment attributes; Gini impurity;
D O I
10.1145/3205977.3208949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Attribute-based Access Control (ABAC) systems, utilizing environment attributes along with the subject and object attributes introduces a dynamic nature to the access decisions. The inclusion of environment attributes helps in achieving a more fine-grained access control. In this paper, we present an ABAC policy mining algorithm that considers the environment attributes and their associated values while forming the rules. Furthermore, we use gini impurity to form the rules. This helps to minimize the number of rules in the generated policy. The experimental evaluation shows that our approach is quite effective in practice.
引用
收藏
页码:213 / 215
页数:3
相关论文
共 5 条
[1]  
Breiman L., 1997, MACH LEARN, P41
[2]  
Gautam M., 2017, S ACC CON MOD TECH, P21
[3]  
Servos D., 2017, ACM Computing Surveys (CSUR), V49, P1
[4]   Efficient bottom-up Mining of Attribute Based Access Control Policies [J].
Talukdar, Tanay ;
Batra, Gunjan ;
Vaidya, Jaideep ;
Atluri, Vijayalakshmi ;
Sural, Shamik .
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, :339-348
[5]   Mining Attribute-Based Access Control Policies [J].
Xu, Zhongyuan ;
Stoller, Scott D. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :533-545