Profact: A provenance-based analytics framework for access control policies

AA Jabal, M Davari, E Bertino, C Makaya… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Policy-based access control systems are crucial for secure information sharing in
collaborative applications. However, policy management needs to be flexible in order to …

Provenance-based analytics services for access control policies

E Bertino, AA Jabal, S Calo, C Makaya… - 2017 IEEE World …, 2017 - ieeexplore.ieee.org
Successful collaborations require information and resource sharing and thus adequate
access control policy management systems that control sharing among the collaborating …

Access control policy generation from user stories using machine learning

J Heaps, R Krishnan, Y Huang, J Niu… - Data and Applications …, 2021 - Springer
Agile software development methodology involves developing code incrementally and
iteratively from a set of evolving user stories. Since software developers use user stories to …

Mining likely properties of access control policies via association rule mining

JH Hwang, T Xie, V Hu, M Altunay - … and Privacy XXIV: 24th Annual IFIP …, 2010 - Springer
Access control mechanisms are used to control which principals (such as users or
processes) have access to which resources based on access control policies. To ensure the …

Toward efficient and confidentiality-aware federation of access control policies

M Decat, B Lagaisse, W Joosen - Proceedings of the 7th Workshop on …, 2012 - dl.acm.org
This paper presents our work in progress on efficient and confidentiality-aware access
control for Software-as-a-Service applications. In SaaS, a tenant organization rents access …

A framework for policy similarity evaluation and migration based on change detection

J Vaidya, B Shafiq, V Atluri, D Lorenzi - … , NSS 2015, New York, NY, USA …, 2015 - Springer
Access control facilitates controlled sharing and protection of resources in an enterprise.
However, given the ubiquity of collaborative applications and scenarios, enterprises no …

Measurement and prediction of access control policy evaluation performance

B Butler, B Jennings - IEEE Transactions on Network and …, 2015 - ieeexplore.ieee.org
As the need for more pervasive and more complex access controls grows, the challenge of
ensuring the performance of access control systems is becoming apparent. Researchers …

A rigorous framework for specification, analysis and enforcement of access control policies

A Margheri, M Masi, R Pugliese… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …

Towards policy retrieval for provenance based access control model

J Pei, X Ye - 2014 IEEE 13th International Conference on Trust …, 2014 - ieeexplore.ieee.org
Provenance Based Access Control (PBAC) is a new access control mechanism wherein the
access control decisions are made based on a set of assertions about provenance traces …

Detecting and resolving policy misconfigurations in access-control systems

L Bauer, S Garriss, MK Reiter - ACM Transactions on Information and …, 2011 - dl.acm.org
Access-control policy misconfigurations that cause requests to be erroneously denied can
result in wasted time, user frustration, and, in the context of particular applications (eg, health …