Validation of consistency and completeness of Access Control Policy Set Using Data Mining Algorithms

Shaikh, Riaz Ahmed (2014) Validation of consistency and completeness of Access Control Policy Set Using Data Mining Algorithms. US8904472B2.

Full text not available from this repository. (Request a copy)

Abstract

Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies.

Item Type: Patent
Faculty \ School: Faculty of Science > School of Computing Sciences
UEA Research Groups: Faculty of Science > Research Groups > Cyber Security Privacy and Trust Laboratory
Related URLs:
Depositing User: LivePure Connector
Date Deposited: 10 May 2023 16:30
Last Modified: 10 May 2023 16:30
URI: https://ueaeprints.uea.ac.uk/id/eprint/92020
DOI: US8904472B2

Actions (login required)

View Item View Item