期刊文献+

基于日志的富语义ABAC 策略挖掘 被引量:4

Log-based rich-semantic ABAC policy mining
在线阅读 下载PDF
导出
摘要 为了解决大规模环境下的细粒度访问控制问题,挖掘出易于人工阅读、契合主体行为模式、精确完备的基于属性的访问控制(ABAC)策略,从而为安全管理员进行策略构建、维护和优化提供有力支撑,提出基于日志的富语义ABAC策略挖掘方法.该方法基于频繁模式挖掘算法,从访问日志和属性数据中挖掘契合主体行为模式的ABAC策略.对策略进行正确性和语义质量分析获得富语义ABAC策略集.通过交叉验证方法对策略集的精确性和完备性进行验证,算法在公开数据集上的F1得分为0.8375,在手写数据集上的F1得分为0.9394.在手写数据集上的验证表明,算法可以在较小训练集上得到比现有算法更高质量的策略集,所得授权规则在易读性方面有所提升. A log-based rich-semantic attribute-based access control(ABAC)policy mining method was proposed,to deal with fine-grained access control in large-scale information system,and to mine out readable,accurate and complete ABAC policy set,which is consistent with subject behavior profiles,so as to provide strong support for security administrator on constructing,maintaining and optimizing ABAC policy set.ABAC policies consistent with subject behavior are found out from access log and attribute data by frequent pattern mining in the proposed method.The rich-semantic ABAC policy set is obtained by correctness and semantic quality analysis.The accuracy and the completeness of the method were verified using cross-validation technique.The F1-score on public dataset was 0.8375,and that on handmade dataset was 0.9394.Validation on handmade dataset indicates that the method can mine policy set with higher quality than existing ones on small train set.The improvement of semantic quality of authorization rules is also proved on the handmade dataset.
作者 毋文超 任志宇 杜学绘 WU Wen-chao;REN Zhi-yu;DU Xue-hui(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2020年第11期2149-2157,共9页 Journal of Zhejiang University:Engineering Science
基金 国家自然科学基金资助项目(61702550,61802436) 国家重点研发计划资助项目(2018YFB0803603).
关键词 基于属性的访问控制(ABAC) 策略挖掘 访问日志 频繁模式挖掘 富语义策略 attribute-based access control(ABAC) policy mining access log frequent pattern mining rich-semantic policy
  • 相关文献

参考文献2

二级参考文献71

  • 1WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 2袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 3M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 4V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 5E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 6C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 7J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 8J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 9D Q Zou,L G He,H Jin,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application environment[J].Journal of Network and Computer Applications,2009,32(2):402-411.
  • 10R Yang,C Lin,F Feng.A time and mutable attribute-based access control model[J].Journal of Computers,2009,4(6):510-518.

共引文献165

同被引文献18

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部