-
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies
Relationship-based access control (ReBAC) provides a high level of expre...
read it
-
Efficient and Extensible Policy Mining for Relationship-Based Access Control
Relationship-based access control (ReBAC) is a flexible and expressive f...
read it
-
Graph Model Implementation of Attribute-Based Access Control Policies
Attribute-based access control (ABAC) promises a powerful way of formali...
read it
-
Cascade Attribute Network: Decomposing Reinforcement Learning Control Policies using Hierarchical Neural Networks
Reinforcement learning methods have been developed to achieve great succ...
read it
-
A Precedent Approach to Assigning Access Rights
To design a discretionary access control policy, a technique is proposed...
read it
-
Practical Decentralized Attribute-Based Delegation using Secure Name Systems
Identity and trust in the modern Internet are centralized around an olig...
read it
-
Using the decision support algorithms combining different security policies
During the development of the security subsystem of modern information s...
read it
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values
Attribute-Based Access Control (ABAC) and Relationship-based access control (ReBAC) provide a high level of expressiveness and flexibility that promote security and information sharing, by allowing policies to be expressed in terms of attributes of and chains of relationships between entities. Algorithms for learning ABAC and ReBAC policies from legacy access control information have the potential to significantly reduce the cost of migration to ABAC or ReBAC. This paper presents the first algorithms for mining ABAC and ReBAC policies from access control lists (ACLs) and incomplete information about entities, where the values of some attributes of some entities are unknown. We show that the core of this problem can be viewed as learning a concise three-valued logic formula from a set of labeled feature vectors containing unknowns, and we give the first algorithm (to the best of our knowledge) for that problem.
READ FULL TEXT
Comments
There are no comments yet.