首页> 外文会议>ACM symposium on access control models and technologies >Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution
【24h】

Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution

机译:用于访问控制策略的生成模型:应用于在具有归因的日志上挖掘的应用程序

获取原文

摘要

We consider a fundamentally new approach to role and policy mining: finding RBAC models which reflect the observed usage, of entitlements and the attributes of users. Such policies are interpretable, i.e., there is a natural explanation of why a role is assigned to a user and are conservative from a security standpoint since they are based on actual usage. Further, such "generative" models provide many other benefits including reconciliation with policies based on entitlements, detection of provisioning errors, as well as the detection of anomalous behavior. Our contributions include defining the fundamental problem as extensions of the well-known role mining problem, as well as providing several new algorithms based on generative machine learning models. Our algorithms find models which are causally associated with actual usage of entitlements and any arbitrary combination of user attributes when such information is available. This is the most natural process to provision roles, thus addressing a key usability issue with existing role mining algorithms. We have evaluated our approach on a large number of real life data sets, and our algorithms produce good role decompositions as measured by metrics such as coverage, stability. and generality. We compare our algorithms with traditional role mining algorithms by equating usage with entitlement. Results show that our algorithms improve on existing approaches including exact mining, approximate mining, and probabilistic algorithms: the results are more temporally stable than exact mining approaches, and are faster than probabilistic algorithms while removing artificial constraints such as the number of roles assigned to each user. Most importantly, we believe that these roles more accurately capture what users actually do. the essence of a role, which is not captured by traditional methods.
机译:我们考虑了一个从根本上的角色和政策挖掘方法:找到反映观察到的使用,授权和用户属性的RBAC模型。此类策略是可解释的,即,对于为用户分配给用户的原因并且是保守的自然解释,因为它们基于实际使用。此外,这种“生成”模型提供了许多其他益处,包括基于权利的策略,检测到供应错误的策略,以及检测异常行为。我们的贡献包括将基本问题定义为众所周知的角色挖掘问题的扩展,以及根据生成机器学习模型提供几种新算法。我们的算法找到了与此类信息可用时的实际使用情况以及用户属性的任何任意组合的模型。这是提供角色最自然的过程,从而解决了现有角色挖掘算法的关键可用性问题。我们已经在大量实际数据集上进行了评估方法,我们的算法产生了良好的作用分解,如覆盖率,稳定性等度量所测量。和一般性。我们将算法与传统角色挖掘算法进行比较,通过与权利等同使用。结果表明,我们的算法改进了现有的方法,包括精确采矿,近似挖掘和概率算法:结果比精确的采矿方法更常时,并且比概率算法更快,同时去除人为约束,例如分配给各分配的角色数用户。最重要的是,我们相信这些角色更准确地捕获用户实际所做的事情。角色的本质,这是由传统方法捕获的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号