Realizing Information Flow Control in ABAC Mining

[1]  R. K. Shyamasundar,et al.  A Complete Generative Label Model for Lattice-Based Access Control Models , 2017, SEFM.

[2]  R. K. Shyamasundar,et al.  Towards Unifying RBAC with Information Flow Control , 2021, SACMAT.

[3]  Vijayalakshmi Atluri,et al.  A Framework for Policy Similarity Evaluation and Migration Based on Change Detection , 2015, NSS.

[4]  Vijayalakshmi Atluri,et al.  Poster: Constrained Policy Mining in Attribute Based Access Control , 2017, SACMAT.

[5]  Ravi S. Sandhu,et al.  The authorization leap from rights to attributes: maturation or chaos? , 2012, SACMAT '12.

[6]  Sylvia L. Osborn Information flow analysis of an RBAC system , 2002, SACMAT '02.

[7]  Sylvia L. Osborn,et al.  Modeling Mandatory Access Control in Role-Based Security Systems , 1995, DBSec.

[8]  Ravi S. Sandhu,et al.  Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy , 2016, ABAC '16.

[9]  Mikhail I. Gofman,et al.  RBAC-PAT: A Policy Analysis Tool for Role Based Access Control , 2009, TACAS.

[10]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[11]  Ehud Gudes,et al.  Resolving Information Flow Conflicts in RBAC Systems , 2006, DBSec.

[12]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.

[13]  Yingjiu Li,et al.  An attribute-based access matrix model , 2005, SAC '05.

[14]  Scott D. Stoller,et al.  Mining Attribute-Based Access Control Policies from Logs , 2014, DBSec.

[15]  Ram Krishnan,et al.  On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis , 2019, SKM.

[16]  Sushil Jajodia,et al.  A logic-based framework for attribute based access control , 2004, FMSE '04.

[17]  Sylvia L. Osborn,et al.  The role graph model and conflict of interest , 1999, TSEC.

[18]  Ravi S. Sandhu Role Hierarchies and Constraints for Lattice-Based Access Controls , 1996, ESORICS.