Vijayalakshmi, K. and Jayalakshmi, V. (2021) Identifying Considerable Anomalies and Conflicts in ABAC Security Policies. 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). pp. 1273-1280.
![[thumbnail of 811.pdf]](https://ir.vistas.ac.in/style/images/fileicons/archive.png)
811.pdf
Download (4MB)
Abstract
Abstract— Nowadays security of shared resources and big data is an important and critical issue. With the growth of information technology and social networks, data and resources are shared in
the distributed environment such as cloud and fog computing.
Various access control models protect the shared resources from unauthorized users or malicious intruders. Despite the attribute- based access control model that meets the complex security requirement of todays’ new computing technologies, considerable anomalies and conflicts in ABAC policies affect the efficiency of the security system. One important and toughest task is policy validation thus to detect and eliminate anomalies and conflicts in policies. Though the previous researches identified anomalies, failed to detect and analyze all considerable anomalies that
results vulnerable to hacks and attacks. The primary objective of this paper is to study and analyze the possible anomalies and conflicts in ABAC security policies. We have discussed and analyzed considerable conflicts in policies based on previous researches. This paper can provide a detailed review of anomalies and conflicts in security policies. Keywords— Access control models, Anomalies, Attribute based access control model, Big data, Conflicts, Policy validation, Security Policy.
Item Type: | Article |
---|---|
Subjects: | Education > Computer Basics |
Divisions: | Electrical and Electronics Engineering |
Depositing User: | Mr IR Admin |
Date Deposited: | 13 Sep 2024 10:16 |
Last Modified: | 13 Sep 2024 10:16 |
URI: | https://ir.vistas.ac.in/id/eprint/5905 |