Permission clustering-based attribute value optimization
In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021077 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529827763421184 |
---|---|
author | Wenchao WU Zhiyu REN Xuehui DU |
author_facet | Wenchao WU Zhiyu REN Xuehui DU |
author_sort | Wenchao WU |
collection | DOAJ |
description | In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score. |
format | Article |
id | doaj-art-ca4f74da67264684be89490ee12e45e4 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2021-08-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-ca4f74da67264684be89490ee12e45e42025-01-15T03:15:09ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-08-01717518259568380Permission clustering-based attribute value optimizationWenchao WUZhiyu RENXuehui DUIn new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021077attribute valueoptimizationrough set theoryABACaccess control |
spellingShingle | Wenchao WU Zhiyu REN Xuehui DU Permission clustering-based attribute value optimization 网络与信息安全学报 attribute valueoptimization rough set theory ABAC access control |
title | Permission clustering-based attribute value optimization |
title_full | Permission clustering-based attribute value optimization |
title_fullStr | Permission clustering-based attribute value optimization |
title_full_unstemmed | Permission clustering-based attribute value optimization |
title_short | Permission clustering-based attribute value optimization |
title_sort | permission clustering based attribute value optimization |
topic | attribute valueoptimization rough set theory ABAC access control |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021077 |
work_keys_str_mv | AT wenchaowu permissionclusteringbasedattributevalueoptimization AT zhiyuren permissionclusteringbasedattributevalueoptimization AT xuehuidu permissionclusteringbasedattributevalueoptimization |