Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes

被引:9
|
作者
Das, Saptarshi [1 ]
Sural, Shamik [1 ]
Vaidya, Jaideep [2 ]
Atluri, Vijayalakshmi [2 ]
机构
[1] IIT Kharagpur, Kharagpur, W Bengal, India
[2] Rutgers State Univ, New Brunswick, NJ USA
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
ABAC; Policy mining; Environment attributes; Gini impurity;
D O I
10.1145/3205977.3208949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Attribute-based Access Control (ABAC) systems, utilizing environment attributes along with the subject and object attributes introduces a dynamic nature to the access decisions. The inclusion of environment attributes helps in achieving a more fine-grained access control. In this paper, we present an ABAC policy mining algorithm that considers the environment attributes and their associated values while forming the rules. Furthermore, we use gini impurity to form the rules. This helps to minimize the number of rules in the generated policy. The experimental evaluation shows that our approach is quite effective in practice.
引用
收藏
页码:213 / 215
页数:3
相关论文
共 50 条
  • [21] An Attribute-based Access Control Scheme in Cloud Storage Environment
    Xing, M. H.
    Li, W. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 129 - 134
  • [22] An Ontological Template for Context Expressions in Attribute-based Access Control Policies
    Veloudis, Simeon
    Paraskakis, Iraklis
    Petsos, Christos
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 123 - 134
  • [23] Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies
    Thang Bui
    Stoller, Scott D.
    Sharma, Shikhar
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 101 - 119
  • [24] Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System
    Shen, Zhuoxiang
    Gao, Neng
    Liu, Zeyi
    Li, Min
    Wang, Chuanyin
    SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 110 - 125
  • [25] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [26] An Attribute-Based Access Control using chaincode in RFID systems
    Figueroa, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    Irigoyen, Inigo
    Monterde, Mario
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [27] Attribute-based Encryption for Access Control Using Elementary Operations
    Crampton, Jason
    Pinto, Alexandre
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 125 - 139
  • [28] Attribute-Based Access Control using Combined Authentication Technologies
    Park, Hyun-A
    Lee, Dong Hoon
    Zhan, Justin
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 518 - +
  • [29] Using Attribute-Based Access Control for Remote Healthcare Monitoring
    Ray, Indrakshi
    Alangot, Bithin
    Nair, Shilpa
    Achuthan, Krishnashree
    2017 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2017, : 137 - 142
  • [30] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48