83,981 Hits in 5.8 sec

Efficient and Extensible Policy Mining for Relationship-Based Access Control [article]

Thang Bui, Scott D. Stoller, Hieu Le
2019 arXiv   pre-print
Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities  ...  This paper presents a ReBAC policy mining algorithm designed to be both (1) easily extensible (to support additional policy language features) and (2) scalable. The algorithm is based on Bui et al.'  ...  INTRODUCTION In relationship-based access control (ReBAC), access control policies are expressed in terms of chains of relationships between entities. is increases expressiveness and o en allows more natural  ... 
arXiv:1903.07530v2 fatcat:idwqnfamxvfkhd4ac6p3nx7xry

Machine Learning in Access Control: A Taxonomy and Survey [article]

Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu
2022 arXiv   pre-print
An increasing body of work has recognized the importance of exploiting machine learning (ML) advancements to address the need for efficient automation in extracting access control attributes, policy mining  ...  We highlight current limitations and open challenges such as lack of public real-world datasets, administration of ML-based access control systems, understanding a black-box ML model's decision, etc.,  ...  Authors' addresses: Mohammad Nur Nobi, Institute for Cyber Security (ICS) and Department of Computer Science, and University of Texas at San Antonio, Texas, USA.,; Maanak Gupta  ... 
arXiv:2207.01739v1 fatcat:u34qfyvhhnhfrmrur5knhch44y

Data Security Monitoring Platform in Cloud for Enterprise

Geng Yushui, Pang Shunpeng
2013 International Journal of Security and Its Applications  
The model proposed by this paper uses multi-tenancy SaaS(Software as Service) application architecture, RBAC (Role-Based policies Access Control) model and operation in the context of environmental perception  ...  The model can set the authentication, logging, fine-grained access control, dynamic data filtering strategy and data audit to realize the security protection for enterprises data.  ...  Summary Dynamic data filtering policies of the present study is based on role-based control mechanism about access.  ... 
doi:10.14257/ijsia.2013.7.6.07 fatcat:ls47dplocbcd7feetif7opapte


2011 International Journal of Semantic Computing (IJSC)  
Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and  ...  programming language-based approaches to mobile code certification and data confidentiality enforcement are discussed.  ...  Researchers have proposed extensions for XACML for finer-grained access control.  ... 
doi:10.1142/s1793351x11001201 fatcat:5yddnb5kgngfnpy3urke6ulwai

Intelligent Role-Based Access Control Model and Framework using Semantic Business Roles in Multi-domain Environments

Rubina Ghazal, Ahmad Kamran Malik, Nauman Qadeer, Basit Raza, Ahmad Raza Shahid, Hani Alquhayz
2020 IEEE Access  
organizations can be fulfilled through considering dynamicity of changing environments and versatility of access control policies.  ...  The popularity of Role-Based Access Control (RBAC) model is irrefutable because of low administrative overhead and largescale implementation in business organizations.  ...  At the end, the I-RBAC model is validated for its efficiency using the real data of roles and large number of access control rules (permissions) and requests.  ... 
doi:10.1109/access.2020.2965333 fatcat:m55xr7zw6nfafpl5omphhnqzqq

BlendMAS: A BLockchain-ENabled Decentralized Microservices Architecture for Smart Public Safety [article]

Ronghua Xu, Seyed Yahya Nikouei, Yu Chen, Erik Blasch, Alex Aved
2019 arXiv   pre-print
An extensive experimental study verified that the proposed BlendMAS is able to offer a decentralized, scalable and secured data sharing and access control to distributed IoT based SPS system.  ...  Within a permissioned blockchain network, a microservices based security mechanism is introduced to secure data access control in an SPS system.  ...  ACKNOWLEDGEMENTS The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or  ... 
arXiv:1902.10567v1 fatcat:xvjkadcqynbopfxbszprrvx53u

Effective Evaluation of Relationship-Based Access Control Policy Mining

Padmavathi Iyer, Amirreza Masoumzadeh
2022 Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies  
Mining algorithms for relationship-based access control policies produce policies composed of relationship-based patterns that justify the input authorizations according to a given system graph.  ...  The correct functioning of a policy mining algorithm is typically tested based on experimental evaluations, in each of which the miner is presented with a set of authorizations and a system graph, and  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for their valuable comments and helpful suggestions.  ... 
doi:10.1145/3532105.3535022 fatcat:65vrl2suurfyhftaotnwew5why

Multiple Attribute Based Data Security in Cloud Computing

2016 International Journal of Science and Research (IJSR)  
Attribute-based encryption also enables access control over encrypted data using access policies and ascribed attributes.  ...  Encrypter has full control over access rights, providing feasible key management. In role-based system, policies can be generated and based in that policies, encryption can be done.  ...  worked on attribute-based mining process for the organization-based access control model.  ... 
doi:10.21275/v5i3.nov161903 fatcat:xshpydl4nbcq3pqa3xnda2kzwu

Threshold Cryptography Based Data Security in Cloud Computing

Sushil Kr Saroj, Sanjeev Kr Chauhan, Aravendra Kr Sharma, Sundaram Vats
2015 2015 IEEE International Conference on Computational Intelligence & Communication Technology  
Attribute-based encryption also enables access control over encrypted data using access policies and ascribed attributes.  ...  Encrypter has full control over access rights, providing feasible key management. In role-based system, policies can be generated and based in that policies, encryption can be done.  ...  worked on attribute-based mining process for the organization-based access control model.  ... 
doi:10.1109/cict.2015.149 fatcat:5ueserqbvba5nk64xqoqyiim7m

Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework

Gabriel Nyame, Zhiguang Qin
2020 Information  
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations.  ...  KMS is the technology-based knowledge management tool used to acquire, store, share, and apply knowledge for improved collaboration and knowledge-value creation.  ...  One such commonly deployable models are the role-based access control (RBAC) model.  ... 
doi:10.3390/info11060334 fatcat:bo55xmi44jac7cliikr7prfnf4

BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs [article]

Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen
2018 arXiv   pre-print
Based on the blockchain network, a capability delegation mechanism is suggested for access permission propagation.  ...  A robust identity based capability token management strategy is proposed, which takes advantage of smart contract for registering, propagation and revocation of the access authorization.  ...  Inspired by the SUN DIGITAL ECOSYSTEM ENVIRONMENT project [27] , a capability-based access control (CapAC) model was proposed that adopted a centralized approach for managing access control policy [17  ... 
arXiv:1804.09267v1 fatcat:gybholdhv5c4hktfhuzpmbjrcy

Efficient and Secure Mechanism for Privacy Preserving and Data Sharing in Online Social Networks

2019 International Journal for Research in Applied Science and Engineering Technology  
that would result to the encouragement of an individual for using online networking platform and can make Indian as a digital Indian Be free and live safe.  ...  There is a huge risk in online networking platform. so keeping in view about the upper problem they brought on mechanism it; In this research paper we implement an novel secure mechanism called trust based  ...  This multiparty access control model consists of a multi policy specification mechanism and evolution of the policy.  ... 
doi:10.22214/ijraset.2019.5001 fatcat:em2yxx4uc5cdxlwinrrjfx5nvy

Chapter 13 A More Resilient Policy Approach to Spatial Fragmentation [chapter]

Mariske van Aswegen, Ernst Drewes
2021 Coal and Energy in South Africa  
A further problem for this city is the impermanence of the mines and the fluctuating commodity prices. The uncertainty puts pressure on the supply and  ...  Fragmented cities are a global problem, as various policy documents highlight.  ...  We propose a multifaceted approach, based on policy guidance, to increase the resilience and efficiency of urban areas.  ... 
doi:10.1515/9781474487078-019 fatcat:leupyvcmknbsfosjetmjvg6j6a

Research on ABAC Access Control Based on Big Data Platform

Kun Yang, Xuanxu Jin, Xingyu Zeng
2021 Journal of Cyber Security  
Based on attribute access control, this paper proposes a HBMC-ABAC big data access control framework.  ...  In the environment of big data, the traditional access control lacks effective and flexible access mechanism.  ...  XACML Overview 2.3.1 Policy Language Model of XACML XACML [9] (extensible Access Control Markup Language) is an extensible, platform-independent and highly secure access control policy description language  ... 
doi:10.32604/jcs.2021.026735 fatcat:zl4tqg5zfjdkhl5tr22f2sih3y

Secure knowledge management: confidentiality, trust, and privacy

E. Bertino, L.R. Khan, R. Sandhu, B. Thuraisingham
2006 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Index Terms-Data mining, privacy, role-based access control (RBAC), secure knowledge management, security policy, semantic web, trust negotiation (TN), usage control (UCON).  ...  In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored.  ...  Previously, he has published influential and widely cited papers on various security topics including safety and expressive power of access-control models, lattice-based access controls, and multilevel  ... 
doi:10.1109/tsmca.2006.871796 fatcat:pnqtkbbuazaipeqlo3iz4isdri
« Previous Showing results 1 — 15 out of 83,981 results