Skip to main navigation Skip to search Skip to main content

Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Relationship-based access control (ReBAC) extends attribute-based access control (ABAC) to allow policies to be expressed in terms of chains of relationships between entities. ReBAC policy mining algorithms have potential to significantly reduce the cost of migration from legacy access control systems to ReBAC, by partially automating the development of a ReBAC policy. This paper presents algorithms for mining ReBAC policies from information about entitlements together with information about entities. It presents the first such algorithms designed to handle incomplete information about entitlements, typically obtained from operation logs, and noise (errors) in information about entitlements. We present two algorithms: a greedy search guided by heuristics, and an evolutionary algorithm. We demonstrate the effectiveness of the algorithms on several policies, including 3 large case studies.

Original languageEnglish
Title of host publicationFoundations and Practice of Security - 11th International Symposium, FPS 2018, Revised Selected Papers
EditorsGuillaume Bonfante, Nur Zincir-Heywood, Mourad Debbabi, Joaquin Garcia-Alfaro
PublisherSpringer Verlag
Pages267-284
Number of pages18
ISBN (Print)9783030184186
DOIs
StatePublished - 2019
Event11th International Symposium on Foundations and Practice of Security, FPS 2018 - Montreal, Canada
Duration: Nov 13 2018Nov 15 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11358 LNCS

Conference

Conference11th International Symposium on Foundations and Practice of Security, FPS 2018
Country/TerritoryCanada
CityMontreal
Period11/13/1811/15/18

Fingerprint

Dive into the research topics of 'Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data'. Together they form a unique fingerprint.

Cite this