A Survey of Access Control Misconfiguration Detection Techniques

04/16/2023
by   Bingyu Shen, et al.
0

Access control mechanisms have been adopted in many real-world systems to control resource sharing for the principals in the system. An error in the access control policy (misconfiguration) can easily cause severe data leakage and system exploitation. Researchers have developed several methodologies to detect the access control misconfigurations through data mining, testing, and verification for various applications. This survey will study the line of works to detect access control misconfigurations and discuss some future research directions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/04/2022

Machine Learning in Access Control: A Taxonomy and Survey

An increasing body of work has recognized the importance of exploiting m...
research
01/19/2021

Automated Verification and Synthesis of Stochastic Hybrid Systems: A Survey

Stochastic hybrid systems have received significant attentions as a rele...
research
03/28/2022

Toward Deep Learning Based Access Control

A common trait of current access control approaches is the challenging n...
research
09/07/2018

On-line tracing of XACML-based policy coverage criteria

Currently, eXtensible Access Control Markup Language (XACML) has becomin...
research
06/15/2021

A Survey on Mining and Analysis of Uncertain Graphs

Uncertain Graph (also known as Probabilistic Graph) is a generic model t...
research
04/02/2023

Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey

One of the most elusive types of malware in recent times that pose signi...
research
07/01/2020

Query Based Access Control for Linked Data

In recent years we have seen significant advances in the technology used...

Please sign up or login with your details

Forgot password? Click here to reset