An Optimized Approach for Assisted Firewall Anomaly Resolution

D Bringhenti, L Seno, F Valenza - IEEE Access, 2023 - ieeexplore.ieee.org
The security configuration of firewalls is a complex task that is commonly performed
manually by network administrators. As a consequence, among the rules composing firewall …

An ASP framework for the refinement of authorization and obligation policies

D Inclezan - Theory and Practice of Logic Programming, 2023 - cambridge.org
This paper introduces a framework for assisting policy authors in refining and improving their
policies. In particular, we focus on authorization and obligation policies that can be encoded …

Mining attribute-based access control policies

M Davari, M Zulkernine - International Conference on Information Systems …, 2022 - Springer
The flexibility feature of Attribute-Based Access Control (ABAC) makes it a powerful access
control model for supporting the authorization demands of complex and dynamic systems …

Classification-Based Anomaly Prediction in XACML Policies

M Davari, M Zulkernine - International Conference on Security and Privacy …, 2022 - Springer
Abstract XACML (eXtensible Access Control Markup Language) has gained significant
interest as a standard to define Attribute-Based Access Control (ABAC) policies for different …

[PDF][PDF] Managing Delegation and Conflicts of Interest in Role-Based Access Control

N Nassr, E Steegmans - 2023 - lirias.kuleuven.be
This dissertation is achieved as a result of my research during my doctoral journey. As I mark
this significant milestone in my life, I would like to thank all people who have inspired me …