Evolutionary Inference of Attribute-Based Access Control Policies

作者: Eric Medvet , Alberto Bartoli , Barbara Carminati , Elena Ferrari

DOI: 10.1007/978-3-319-15934-8_24

关键词:

摘要: The interest in attribute-based access control policies is increasingly growing due to their ability accommodate the complex security requirements of modern computer systems. With this novel paradigm, consist attribute expressions which implicitly describe properties subjects and protection objects must be satisfied for a request allowed. Since specifying policy framework may very complex, approaches mining, i.e., inferring specification automatically from examples form logs authorized denied requests, have been recently proposed.

参考文章(19)
Nurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli, Mining roles from web application usage patterns trust and privacy in digital business. pp. 125- 137 ,(2011) , 10.1007/978-3-642-22890-2_11
Alberto Bartoli, Simone Cumar, Andrea De Lorenzo, Eric Medvet, Compressing Regular Expression Sets for Deep Packet Inspection parallel problem solving from nature. pp. 394- 403 ,(2014) , 10.1007/978-3-319-10762-2_39
Johannes Fürnkranz, Separate-and-Conquer Rule Learning Artificial Intelligence Review. ,vol. 13, pp. 3- 54 ,(1999) , 10.1023/A:1006524209794
S. Bleuler, M. Brack, L. Thiele, E. Zitzler, Multiobjective genetic programming: reducing bloat using SPEA2 congress on evolutionary computation. ,vol. 1, pp. 536- 543 ,(2001) , 10.1109/CEC.2001.934438
Yow Tzu Lim, Pau Chen Cheng, Pankaj Rohatgi, John Andrew Clark, None, MLS security policy evolution with genetic programming Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08. pp. 1571- 1578 ,(2008) , 10.1145/1389095.1389395
Barbara Carminati, Elena Ferrari, Michele Guglielmi, A System for Timely and Controlled Information Sharing in Emergency Situations IEEE Transactions on Dependable and Secure Computing. ,vol. 10, pp. 129- 142 ,(2013) , 10.1109/TDSC.2013.11
Jeroen Eggermont, Joost N. Kok, Walter A. Kosters, Genetic Programming for data classification: partitioning the search space acm symposium on applied computing. pp. 1001- 1005 ,(2004) , 10.1145/967900.968104
Zhongyuan Xu, Scott D Stoller, None, Mining attribute-based access control policies from RBAC policies 2013 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT). pp. 1- 6 ,(2013) , 10.1109/CEWIT.2013.6713753
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, Jorge Lobo, Mining Roles with Multiple Objectives ACM Transactions on Information and System Security. ,vol. 13, pp. 36- ,(2010) , 10.1145/1880022.1880030
Achim D. Brucker, Helmut Petritsch, Extending access control models with break-glass Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09. pp. 197- 206 ,(2009) , 10.1145/1542207.1542239