Skip to main navigation Skip to search Skip to main content

Extracting attribute-based access control rules from business process event logs

  • Lebanese University
  • Lebanese International University

Research output: Contribution to journalConference articlepeer-review

Abstract

—Protecting sensitive information from unauthorized access is recognized as a crucial issue for today’s organizations. Identity and Access Management is one of the best practices techniques that ensure that the right people have access to the right systems at the right time. In particular, Attribute-Based Access Control (ABAC) models have recently gained popularity because of their capability to provide fine-grained and contextual access control that is not based on the user but on the attributes of every component in the system. Despite the benefits of adopting ABAC, it is commonly agreed that deploying an ABAC system is a complicated, time-consuming and challenging task. This is because all attributes of the system must be defined, and acess rules must not only be created, but also regularly monitored and reviewed. In this paper, we propose an automated approach to extract ABAC rules from event logs which record the actual execution of business processes. Event logs capture which tasks are performed by whom and at what point in time, and what data are taken as input and output. Therefore, they provide rich information on task and data access policies. Concretely, we propose to use (i) process mining techniques in order to analyze the event log and extract useful attributes and (ii) data mining techniques in order to learn the ABAC rules. To validate our approach, we (i) developed a Java application, and (ii) performed experiments on a real-life event log. Experimental results show that our approach is efficient and feasible.

Original languageEnglish
Pages (from-to)38-45
Number of pages8
JournalCEUR Workshop Proceedings
Volume2622
Publication statusPublished - 1 Jan 2019
Event2nd International Conference on Big Data and Cyber-Security Intelligence, BDCSIntell 2019 - Versailles, France
Duration: 16 Dec 201917 Dec 2019

Keywords

  • Association Rule Mining
  • Attribute Based Access Control Model
  • Event logs
  • Process mining

Fingerprint

Dive into the research topics of 'Extracting attribute-based access control rules from business process event logs'. Together they form a unique fingerprint.

Cite this