A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Identifying high-risk over-entitlement in access control policies using fuzzy logic
2022
Cybersecurity
AbstractAnalysing access control policies is an essential process for ensuring over-prescribed permissions are identified and removed. This is a time-consuming and knowledge-intensive process, largely because there is a wealth of policy information that needs to be manually examined. Furthermore, there is no standard definition of what constitutes an over-entitled permission within an organisation's access control policy, making it not possible to develop automated rule-based approaches. It is
doi:10.1186/s42400-022-00112-1
fatcat:xae4vbi47rg4to7kee7dze5a4e