A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Contemporaneous Update and Enforcement of ABAC Policies
2022
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
In this paper, considering the context of Attribute Based Access Control (ABAC), we propose an approach that is capable of immediately materializing any update to the policy and ensuring that it is taken ...
One possibility is to update the policy based on the incoming changes through ABAC policy mining techniques. ...
The content is solely the responsibility of the authors and does not necessarily represent the official views of the agencies funding the research. ...
doi:10.1145/3532105.3535021
fatcat:qzsz4dfqy5ajdc3tokjpcqz27m
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
[chapter]
2012
Lecture Notes in Computer Science
Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC or the required features of ABAC. ...
Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role ...
Acknowledgment The authors are partially supported by grants from AFOSR MURI and the State of Texas Emerging Technology Fund. ...
doi:10.1007/978-3-642-31540-4_4
fatcat:xv2n4jqb3zahzfdnmaogkfzzdq
Recommender System for Geo-Social Access Control Framework
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
There are different types of access control models, having their own access control policies and criteria to grant the authority, to have an access to specific resources of an organization. ...
According to United States cyber security 2018 statistics, insider threat holds the risk of 74% out of surveyed organizations. ...
Attributes are building blocks of ABAC, to formulate policies and rules. Formulation of policies is done through Extensible Access Control Markup Language (XAML). ...
doi:10.35940/ijitee.b1013.1292s19
fatcat:r2yxhucke5eclckbt3sr5jhuay
Machine Learning in Access Control: A Taxonomy and Survey
[article]
2022
arXiv
pre-print
An increasing body of work has recognized the importance of exploiting machine learning (ML) advancements to address the need for efficient automation in extracting access control attributes, policy mining ...
, policy verification, access decisions, etc. ...
), and Department of Electrical and Computer Engineering, and University of Texas at San Antonio, Texas, USA., ram.krishnan@utsa.edu; Ravi Sandhu, ICS, C-SPECC, and Dept. of Computer Science, and University ...
arXiv:2207.01739v1
fatcat:u34qfyvhhnhfrmrur5knhch44y
D3.1 - ASCLEPIOS Security and Policies Model
2019
Zenodo
It also reports on the semantics of context-based access control and ABE related policies. ...
This deliverable provides a model for formally capturing the background knowledge and enabling the ABAC and ABE paradigms, in terms of the ASCLEPIOS project. ...
CDA introduces the concept of incremental semantic interoperability. ...
doi:10.5281/zenodo.4022334
fatcat:vuujxbm7ozgxdprshc6ir2uqda
From Conventional to State-of-the-Art IoT Access Control Models
2020
Electronics
The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. ...
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics9101693
fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa
VisABAC: A Tool for Visualising ABAC Policies
2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy
Authoring and editing access control policy can be a complex and cognitive demanding task, especially when dealing with a large number of rules and attributes. ...
In this paper, we propose a new tool, VisABAC, which enables the visualisation of attribute based access control policies using the Circle Packing method. ...
Ideally, we would like to ask questions related to any aspect of the editing or maintenance of a policy. ...
doi:10.5220/0006647401170126
dblp:conf/icissp/MorissetS18
fatcat:qjkqnqiz6nhpxbiihnhtgdk3di
MyABDAC
2011
Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11
Attribute-based Access Control (ABAC) based on XACML can substantially improve the security and management of access rights on databases. ...
The main contributions are an architecture and algorithms for efficiently addressing incremental changes in attributes that could trigger changes to the ACLs. ...
The views expressed are those of the authors only. ...
doi:10.1145/1943513.1943528
dblp:conf/codaspy/JahidGHO11
fatcat:fi74l2zhsvcn7exka4jqymvhcq
Greedy and Evolutionary Algorithms for Mining Relationship-Based Access Control Policies
[article]
2018
arXiv
pre-print
ReBAC policy mining algorithms have potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC policy from an ...
We formulate ReBAC as an object-oriented extension of attribute-based access control (ABAC) in which relationships are expressed using fields that refer to other objects, and path expressions are used ...
Entity-based access control: supporting more expressive access control policies. In Proc. 31st Annual Computer Security Applications Conference (ACSAC 2015), pages 291-300. ACM, 2015. ...
arXiv:1708.04749v4
fatcat:z4ujlenvpvgwlil4fv2ggddx4i
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies
[article]
2020
arXiv
pre-print
ReBAC policy mining algorithms have the potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC policy. ...
Compared to state-of-the-art ReBAC mining algorithms, our algorithms are significantly faster, achieve comparable policy quality, and can mine policies in a richer language. ...
Sekar for suggesting decision tree learning as an approach to policy mining. ...
arXiv:1909.12095v5
fatcat:6tusi3bfgzcq3jmeei3vaspsve
Policy-Based Access Controls
2021
IDPro Body of Knowledge
One such paradigm is known as Policy-Based Access Control (PBAC), which is most differentiated by two key characteristics:1. ...
PBAC facilitates the evaluation of context (time of day, location, etc.) in granting access to a protected resource. ...
The discrete nature of PBAC permissions allows these systems to accommodate precise, intuitive, and incremental change to controls as business and regulatory needs emerge without compounding maintenance ...
doi:10.55621/idpro.61
fatcat:5o37rjrrpjd47hzhmud6ozapia
XPA: An Open Soruce IDE for XACML Policies (S)
2018
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering
XPA provides a variety of new techniques for generating test cases from policies, localizing bugs in faulty policies, and repairing faulty policy elements. ...
These policies have been used to quantitatively evaluate the effectiveness of various testing and debugging methods. ...
INTRODUCTION Attribute-Based Access Control (ABAC) is a new generation of access control techniques. ...
doi:10.18293/seke2018-027
dblp:conf/seke/ShresthaPLX18
fatcat:4zh6dl7knvgtjkvfufbl3hob74
T-RBAC based Multi-domain Access Control Method in Cloud
2017
Network Protocols and Algorithms
Comparative trial show that new policy had an advantage in flexibility and availability of multi-domain access control model. ...
In order to improve the deficiency of the current multi domain access control in timeliness and flexibility. This paper put forward a dynamic access control policy on the basis of task driving idea. ...
Acknowledgement This research has been supported by National High Technology Research and Development Application of China (2012AA012902) and "HGJ" National Major Technological Projects (2013ZX01045-004 ...
doi:10.5296/npa.v8i4.10411
fatcat:gbmzmnehafd4nhcfgj6s4imike
PolicyMorph
2007
Proceedings of the 12th ACM symposium on Access control models and technologies - SACMAT '07
This paper introduces PolicyMorph, a constraint system that supports interactive development and maintenance of access control policies that respect both formalized and un-formalized business rules and ...
PolicyMorph advances the state-of-the-art in constraint systems by suggesting predictable policy model modifications that will resolve specific constraint violations and then allowing policy administrators ...
INTRODUCTION Many of the challenges that arise during the development and maintenance of an access control policy are caused by the inability of the policy administrator to correctly translate high-level ...
doi:10.1145/1266840.1266874
dblp:conf/sacmat/LeMayFG07
fatcat:ea7hqxsvfbfftdvf6v6cddey5y
BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT
2018
Computers
Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient ...
While Internet of Things (IoT) technology has been widely recognized as an essential part of Smart Cities, it also brings new challenges in terms of privacy and security. ...
In the ABAC, AC policies are defined through directly associating attributes with subjects. ...
doi:10.3390/computers7030039
fatcat:gs5bc3ojmbexpb2lkhigisphza
« Previous
Showing results 1 — 15 out of 143 results