Poster: Constrained policy mining in attribute based access control

Mayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Abstract

In practical access control systems, it is important to enforce an upper bound on the time taken to respond to an access request. This response time is directly influenced by the size (often called the weight) of each of the underlying access control rules. We present a constrained policy mining algorithm which takes an access control matrix as input and generates a set of attribute based access control (ABAC) rules, such that the weight of each rule is not more than a specified value and the sum of weights of all the rules is minimized. Our initial experiments show encouraging results.

Original languageEnglish (US)
Title of host publicationSACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies
PublisherAssociation for Computing Machinery
Pages121-123
Number of pages3
ISBN (Electronic)9781450347020
DOIs
StatePublished - Jun 7 2017
Event22nd ACM Symposium on Access Control Models and Technologies, SACMAT 2017 - Indianapolis, United States
Duration: Jun 21 2017Jun 23 2017

Publication series

NameProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
VolumePart F128644

Other

Other22nd ACM Symposium on Access Control Models and Technologies, SACMAT 2017
CountryUnited States
CityIndianapolis
Period6/21/176/23/17

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality
  • Information Systems
  • Computer Networks and Communications

Keywords

  • ABAC
  • Constraint
  • Policy mining
  • Weight

Fingerprint Dive into the research topics of 'Poster: Constrained policy mining in attribute based access control'. Together they form a unique fingerprint.

Cite this