Skip to Main content Skip to Navigation
Conference papers

Mining Attribute-Based Access Control Policies from Logs

Abstract : Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the first algorithm for this problem.
Document type :
Conference papers
Complete list of metadata

Cited literature [11 references]  Display  Hide  Download
Contributor : Hal Ifip <>
Submitted on : Tuesday, March 8, 2016 - 11:09:30 AM
Last modification on : Tuesday, August 13, 2019 - 11:22:21 AM
Long-term archiving on: : Sunday, November 13, 2016 - 10:32:27 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Zhongyuan Xu, Scott Stoller. Mining Attribute-Based Access Control Policies from Logs. 28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩. ⟨hal-01284862⟩



Record views


Files downloads