ACKNOWLEDGMENTS
Research reported in this publication was supported
by the National Institutes of Health under award
R35GM134927, and a research gift received from
Cisco University Research. The content is solely the
responsibility of the authors and does not necessarily
represent the official views of the agencies funding
the research.
REFERENCES
Alohaly, M., Takabi, H., and Blanco, E. (2019). Towards an
automated extraction of ABAC constraints from nat-
ural language policies. In ICT Systems Security and
Privacy Protection, pages 105–119.
Batra, G., Atluri, V., Vaidya, J., and Sural, S. (2021a). In-
memory policy indexing for policy retrieval points in
attribute-based access control. In Int. Conf. on Infor-
mation Systems Security, pages 99–120.
Batra, G., Atluri, V., Vaidya, J., and Sural, S. (2021b). In-
cremental maintenance of ABAC policies. In 11th
ACM Conf. on Data and Application Security and Pri-
vacy, pages 185–196.
Cotrini, C., Weghorn, T., and Basin, D. (2018). Mining
ABAC rules from sparse logs. In 2018 IEEE European
Symposium on Security and Privacy, pages 31–46.
Das, S., Sural, S., Vaidya, J., and Atluri, V. (2017). Policy
adaptation in attribute-based access control for inter-
organizational collaboration. In IEEE 3rd Int. Conf.
on Collaboration and Internet Computing, pages 136–
145.
Das, S., Sural, S., Vaidya, J., and Atluri, V. (2018).
Hype: A hybrid approach toward policy engineering
in attribute-based access control. IEEE Letters of the
Computer Society, pages 25–29.
Das, S., Sural, S., Vaidya, J., and Atluri, V. (2019). Pol-
icy adaptation in hierarchical attribute-based access
control systems. ACM Trans. on Internet Technology,
19(3).
Gautam, M., Jha, S., Sural, S., Vaidya, J., and Atluri, V.
(2017). Poster: Constrained policy mining in attribute
based access control. In ACM Symposium on Access
Control Models and Technologies, pages 121–123.
Heutelbeck, D., Baur, M. L., and Kluba, M. (2021). In-
memory policy indexing for policy retrieval points in
attribute-based access control. In 26th ACM Sym-
posium on Access Control Models and Technologies,
pages 59–70.
Hu, V. C., Ferraiolo, D., Kuhn, D. R., Schnitzer, A., San-
dlin, K., Miller, R., and Scarfone, K. (2014). Guide
to Attribute-Based Access Control (ABAC) definition
and considerations. Technical report, NIST Special
Publication.
Jabal, A. A., Bertino, E., Lobo, J., Law, M., Russo, A., Calo,
S., and Verma, D. (2020a). Polisma - a framework for
learning attribute-based access control policies. In Eu-
ropean Symposium on Research in Computer Security,
volume 12308, pages 523–544.
Jabal, A. A., Bertino, E., Lobo, J., Verma, D., Calo, S.,
and Russo, A. (2020b). FLAP – a federated learning
framework for attribute-based access control policies.
Karimi, L., Abdelhakim, M., and Joshi, J. (2021a). Adap-
tive ABAC policy learning: A reinforcement learning
approach.
Karimi, L., Aldairi, M., Joshi, J., and Abdelhakim, M.
(2021b). An automatic attribute based access control
policy extraction from access logs. IEEE Trans. on
Dependable and Secure Computing.
Kumar, R., Palanisamy, B., and Sural, S. (2021). BEAAS:
Blockchain enabled attribute-based access control as
a service. In IEEE International Conference on
Blockchain and Cryptocurrency, pages 1–3.
Lawal, S. and Krishnan, R. (2021). Enabling flexible ad-
ministration in ABAC through policy review: A pol-
icy machine case study. In 7th IEEE Int. Conf. on Big
Data Security on Cloud, IEEE Int. Conf. on High Per-
formance and Smart Computing, and IEEE Int. Conf.
on Intelligent Data and Security, pages 69–74.
Mocanu, D. C., Turkmen, F., and A.Liotta (2015). Towards
ABAC policy mining from logs with deep learning.
Intelligent Systems, pages 124–128.
Narouei, M., Khanpour, H., Takabi, H., Parde, N., and
Nielsen, R. (2017). Towards a top-down policy engi-
neering framework for attribute-based access control.
ACM Symposium on Access Control Models and Tech-
nologies, pages 103–114.
Rouhani, S., Belchior, R., Cruz, R. S., and Deters, R.
(2021). Distributed attribute-based access control sys-
tem using permissioned blockchain. Special Issue on
Emerging Blockchain Applications and Technology,
World Wide Web, 24:1617–1644.
Sanders, M. W. and Yue, C. (2019). Mining least privi-
lege attribute based access control policies. In 35th
Annual Computer Security Applications Conf., pages
404–416.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-Based Access Control Models.
IEEE Computer, 29(2):38–47.
Talukdar, T., Batra, G., Vaidya, J., Atluri, V., and Sural, S.
(2017). Efficient bottom-up mining of attribute based
access control policies. IEEE Int. Conf. on Collabo-
ration and Internet Computing, pages 339–348.
Xu, Z. and Stoller, S. (2015). Mining attribute-based ac-
cess control policies. IEEE Trans. on Dependable and
Secure Computing, 12(5):533–545.
Xu, Z. and Stoller, S. D. (2014). Mining attribute-based ac-
cess control policies from logs. In 28th Annual IFIP
WG 11.3 Working Conf. on Data and Applications Se-
curity and Privacy, pages 276–291.
Zhong, H., Zhou, Y., Zhang, Q., Xu, Y., and Cui, J. (2021).
An efficient and outsourcing-supported attribute-
based access control scheme for edge-enabled smart
healthcare. Future Generation Computer Systems,
115:486–496.
PAMMELA: Policy Administration Methodology using Machine Learning
157