Efficient Bottom-Up Mining of Attribute Based Access Control Policies

Tanay Talukdar, Gunjan Batra, Jaideep Vaidya, Vijayalakshmi Atluri, Shamik Sural

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

Attribute Based Access Control (ABAC) is fast replacing traditional access control models due to its dynamic nature, flexibility and scalability. ABAC is often used in collaborative environments. However, a major hurdle to deploying ABAC is to precisely configure the ABAC policy. In this paper, we present an ABAC mining approach that can automatically discover the appropriate ABAC policy rules. We first show that the ABAC mining problem is equivalent to identifying a set of functional dependencies in relational databases that cover all of the records in a table. We also propose a more efficient algorithm, called ABAC-SRM which discovers the most general policy rules from a set of candidate rules. We experimentally show that ABAC-SRM is accurate and significantly more efficient than the existing state of the art.

Original languageEnglish (US)
Title of host publicationProceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages339-348
Number of pages10
ISBN (Electronic)9781538625651
DOIs
StatePublished - Dec 9 2017
Event3rd IEEE International Conference on Collaboration and Internet Computing, CIC 2017 - San Jose, United States
Duration: Oct 15 2017Oct 17 2017

Publication series

NameProceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017
Volume2017-January

Other

Other3rd IEEE International Conference on Collaboration and Internet Computing, CIC 2017
Country/TerritoryUnited States
CitySan Jose
Period10/15/1710/17/17

All Science Journal Classification (ASJC) codes

  • Management of Technology and Innovation
  • Organizational Behavior and Human Resource Management
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management
  • Communication

Keywords

  • ABAC Mining
  • Access Control
  • Policy Mining

Fingerprint

Dive into the research topics of 'Efficient Bottom-Up Mining of Attribute Based Access Control Policies'. Together they form a unique fingerprint.

Cite this