TY - GEN
T1 - Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data
AU - Bui, Thang
AU - Stoller, Scott D.
AU - Li, Jiajie
N1 - Publisher Copyright: © 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - Relationship-based access control (ReBAC) extends attribute-based access control (ABAC) to allow policies to be expressed in terms of chains of relationships between entities. ReBAC policy mining algorithms have potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC policy. This paper presents algorithms for mining ReBAC policies from information about entitlements together with information about entities. It presents the first such algorithms designed to handle incomplete information about entitlements, typically obtained from operation logs, and noise (errors) in information about entitlements. We present two algorithms: a greedy search guided by heuristics, and an evolutionary algorithm. We demonstrate the effectiveness of the algorithms on several policies, including 3 large case studies.
AB - Relationship-based access control (ReBAC) extends attribute-based access control (ABAC) to allow policies to be expressed in terms of chains of relationships between entities. ReBAC policy mining algorithms have potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC policy. This paper presents algorithms for mining ReBAC policies from information about entitlements together with information about entities. It presents the first such algorithms designed to handle incomplete information about entitlements, typically obtained from operation logs, and noise (errors) in information about entitlements. We present two algorithms: a greedy search guided by heuristics, and an evolutionary algorithm. We demonstrate the effectiveness of the algorithms on several policies, including 3 large case studies.
UR - https://www.scopus.com/pages/publications/85066040340
U2 - 10.1007/978-3-030-18419-3_18
DO - 10.1007/978-3-030-18419-3_18
M3 - Conference contribution
SN - 9783030184186
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 267
EP - 284
BT - Foundations and Practice of Security - 11th International Symposium, FPS 2018, Revised Selected Papers
A2 - Bonfante, Guillaume
A2 - Zincir-Heywood, Nur
A2 - Debbabi, Mourad
A2 - Garcia-Alfaro, Joaquin
PB - Springer Verlag
T2 - 11th International Symposium on Foundations and Practice of Security, FPS 2018
Y2 - 13 November 2018 through 15 November 2018
ER -