Mining least privilege attribute based access control policies.
Matthew W. SandersChuan YuePublished in: ACSAC (2019)
Keyphrases
- access control policies
- access control
- conflict resolution
- security policies
- distributed environment
- extended logic programs
- access control systems
- fine grained
- data mining
- security mechanisms
- security requirements
- role based access control
- knowledge discovery
- trust negotiation
- sensitive data
- distributed systems
- automated trust negotiation