Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the first algorithm for this problem. © 2014 IFIP International Federation for Information Processing.
CITATION STYLE
Xu, Z., & Stoller, S. D. (2014). Mining attribute-based access control policies from logs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8566 LNCS, pp. 276–291). Springer Verlag. https://doi.org/10.1007/978-3-662-43936-4_18
Mendeley helps you to discover research relevant for your work.