Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, Epiciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Skip to Main content Skip to Navigation
Conference papers

Mining Attribute-Based Access Control Policies from Logs

Abstract : Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the first algorithm for this problem.
Document type :
Conference papers
Complete list of metadata

Cited literature [11 references]  Display  Hide  Download

https://hal.inria.fr/hal-01284862
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Tuesday, March 8, 2016 - 11:09:30 AM
Last modification on : Tuesday, October 19, 2021 - 12:58:55 PM
Long-term archiving on: : Sunday, November 13, 2016 - 10:32:27 AM

File

978-3-662-43936-4_18_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Zhongyuan Xu, Scott D. Stoller. Mining Attribute-Based Access Control Policies from Logs. 28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩. ⟨hal-01284862⟩

Share

Metrics

Record views

53

Files downloads

307