A Survey of Using Machine Learning in Extracting and Optimization Access Control Policies

马上开始. 它是免费的哦
注册 使用您的电邮地址
A Survey of Using Machine Learning in Extracting and Optimization Access Control Policies 作者: Mind Map: A Survey of Using Machine Learning in Extracting and Optimization Access Control Policies

1. Policy Optimization

1.1. Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

1.2. Maryem Ait El Hadj et al. 2017. ABAC rule reduction via similarity computation. In ICNS. Springer.

1.3. Yahya Benkaouz, Mohammed Erradi, and Bernd Freisleben. 2016. Work in progress: K-nearest neighbors techniques for abac policies clustering. In ACM International Workshop on Attribute Based Access Control.

2. Role Mining Role/Permission Assignments

2.1. Mario Frank et al. 2008. A class of probabilistic models for role engineering. In ACM CCS.

2.2. Qun Ni et al. 2009. Automating role-based provisioning by learning from examples. In ACM SACMAT.

2.3. Lu Zhou, Chunhua Su, Zhen Li, Zhe Liu, and Gerhard P Hancke. 2019. Automatic fine-grained access control in SCADA by machine learning. Future Generation Computer Systems (2019).

3. Optimization of Access Control Policies

4. Machine Learning in Access Control: A Taxonomy and Survey

5. Policy Extraction from Access logs

5.1. Zhongyuan Xu and Scott D Stoller. 2014. Mining attribute-based access control policies from logs. In IFIP Annual

5.2. E. Medvet, A. Bartoli, B. Carminati, and E. Ferrari, “Evolutionary inference of attribute-based access control policies.,” in EMO (1), pp. 351–365, 2015.

5.3. Decebal Mocanu, Fatih Turkmen, Antonio Liotta, et al. 2015. Towards ABAC policy mining from logs with deep learning. In Proceedings of the 18th International Multiconference, ser. Intelligent Systems. Done

5.4. P. Iyer and A. Masoumzadeh, “Mining positive and negative attribute-based access control policy rules,” in Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, pp. 161–172, ACM, 2018.

5.5. Carlos Cotrini et al. 2018. Mining ABAC rules from sparse logs. In IEEE EuroS&P. Done

5.6. Leila Karimi et al. 2021. An automatic attribute based access control policy extraction from access logs. IEEE TDSC. Done

5.7. Bui, Thang & Stoller, Scott & Le, Hieu. (2019). Efficient and Extensible Policy Mining for Relationship-Based Access Control. 161-172. 10.1145/3322431.3325106.

5.8. Leila Karimi and James Joshi. 2018. An unsupervised learning based approach for mining attribute based access control policies. In 2018 IEEE International Conference on Big Data (Big Data). IEEE. Done

5.9. Thang Bui and Scott D Stoller. 2020. A decision tree learning approach for mining relationship-based access control policies. In ACM SACMAT.

5.10. Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin Calo, and Dinesh Verma. 2020. Polisma-a framework for learning attribute-based access control policies. In ESORICS. Springer. Done