The interest in attribute-based access control policies is increasingly growing due to their ability to accommodate the complex security requirements of modern computer systems. With this novel paradigm, access control policies consist of attribute expressions which implicitly describe the properties of subjects and protection objects and which must be satisfied for a request to be allowed. Since specifying a policy in this framework may be very complex, approaches for policy mining, i.e., for inferring a specification automatically from examples in the form of logs of authorized and denied requests, have been recently proposed. In this work, we propose a multi-objective evolutionary approach for solving the policy mining task. We designed ...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...
The attribute-based access control (ABAC) model has been gaining popularity in recent years because ...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...
The interest in attribute-based access control policies is increasingly growing due to their ability...
The interest in attribute-based access control policies is increasingly growing due to their ability...
Attribute-based access control (ABAC) provides a high level of flexibility that promotes security an...
Abstract—Attribute-based access control (ABAC) provides a high level of flexibility that promotes se...
Access control systems are nowadays the first line of defence of modern IT systems. However, their e...
Attribute-based access control (ABAC) provides a high level of flexibility that promotes security an...
International audienceAttribute-based access control (ABAC) provides a high level of flexibility tha...
Abstract—Role-based access control (RBAC) is very widely used but has notable limitations, prompting...
The paper presents an approach based on machine learning to refine attribute-based access control p...
With the widespread application of new technologies, fine-grained authorization requires a large num...
Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional...
The flexibility, scalability, dynamic nature, portability and identity-less features of Attribute Ba...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...
The attribute-based access control (ABAC) model has been gaining popularity in recent years because ...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...
The interest in attribute-based access control policies is increasingly growing due to their ability...
The interest in attribute-based access control policies is increasingly growing due to their ability...
Attribute-based access control (ABAC) provides a high level of flexibility that promotes security an...
Abstract—Attribute-based access control (ABAC) provides a high level of flexibility that promotes se...
Access control systems are nowadays the first line of defence of modern IT systems. However, their e...
Attribute-based access control (ABAC) provides a high level of flexibility that promotes security an...
International audienceAttribute-based access control (ABAC) provides a high level of flexibility tha...
Abstract—Role-based access control (RBAC) is very widely used but has notable limitations, prompting...
The paper presents an approach based on machine learning to refine attribute-based access control p...
With the widespread application of new technologies, fine-grained authorization requires a large num...
Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional...
The flexibility, scalability, dynamic nature, portability and identity-less features of Attribute Ba...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...
The attribute-based access control (ABAC) model has been gaining popularity in recent years because ...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...