Policy modeling and anomaly detection in ABAC policies

M Davari, M Zulkernine - International Conference on Risks and Security of …, 2021 - Springer
Sensitive data is available online through web and distributed protocols that highlight the
need for access control mechanisms. System designers write access control policies to …

Formal approach to detect and resolve anomalies while clustering ABAC policies

MA El Hadj, A Khoumsi, Y Benkaouz… - … on Security and Safety, 2018 - publications.eai.eu
In big data environments with big number of users and high volume of data, we need to
manage the corresponding huge number of security policies. Using Attribute-Based Access …

Mining attribute-based access control policies

M Davari, M Zulkernine - International Conference on Information Systems …, 2022 - Springer
The flexibility feature of Attribute-Based Access Control (ABAC) makes it a powerful access
control model for supporting the authorization demands of complex and dynamic systems …

Mining attribute-based access control policies from logs

Z Xu, SD Stoller - Data and Applications Security and Privacy XXVIII: 28th …, 2014 - Springer
Attribute-based access control (ABAC) provides a high level of flexibility that promotes
security and information sharing. ABAC policy mining algorithms have potential to …

Contemporaneous update and enforcement of ABAC policies

S Talegaon, G Batra, V Atluri, S Sural… - Proceedings of the 27th …, 2022 - dl.acm.org
Access control policies are dynamic in nature, and therefore require frequent updates to
synchronize with the latest organizational security requirements. As these updates are …

An automatic attribute-based access control policy extraction from access logs

L Karimi, M Aldairi, J Joshi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the rapid advances in computing and information technologies, traditional access
control models have become inadequate in terms of capturing fine-grained, and expressive …

Mining attribute-based access control policies

Z Xu, SD Stoller - IEEE Transactions on Dependable and …, 2014 - ieeexplore.ieee.org
Attribute-based access control (ABAC) provides a high level of flexibility that promotes
security and information sharing. ABAC policy mining algorithms have potential to …

A nature-inspired framework for optimal mining of attribute-based access control policies

M Narouei, H Takabi - Security and Privacy in Communication Networks …, 2019 - Springer
Even though attribute-based access control (ABAC) has been applied to address
authorization in areas such as cloud and internet of things, implementing ABAC policies can …

Incremental maintenance of abac policies

G Batra, V Atluri, J Vaidya, S Sural - … of the Eleventh ACM Conference on …, 2021 - dl.acm.org
Discovery of Attribute Based Access Control policies through mining has been studied
extensively in the literature. However, current solutions assume that the rules are to be …

[PDF][PDF] Clustering-based Approach for Anomaly Detection in XACML Policies.

MA El Hadj, M Ayache, Y Benkaouz, A Khoumsi… - SECRYPT, 2017 - scitepress.org
The development of distributed applications arises multiple security issues such as access
control. Attribute-Based Access Control has been proposed as a generic access control …