{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T17:45:05Z","timestamp":1751564705080,"version":"3.41.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T00:00:00Z","timestamp":1566000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000057","name":"National Institute of General Medical Sciences","doi-asserted-by":"publisher","award":["R01GM118574"],"award-info":[{"award-number":["R01GM118574"]}],"id":[{"id":"10.13039\/100000057","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564034, CNS-1624503, CNS-1747728"],"award-info":[{"award-number":["CNS-1564034, CNS-1624503, CNS-1747728"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2019,8,31]]},"abstract":"<jats:p>In Attribute-Based Access Control (ABAC), access to resources is given based on the attributes of subjects, objects, and environment. There is an imminent need for the development of efficient algorithms that enable migration to ABAC. However, existing policy mining approaches do not consider possible adaptation to the policy of a similar organization. In this article, we address the problem of automatically determining an optimal assignment of attribute values to subjects for enabling the desired accesses to be granted while minimizing the number of ABAC rules used by each subject or other appropriate metrics. We show the problem to be NP-Complete and propose a heuristic solution.<\/jats:p>","DOI":"10.1145\/3323233","type":"journal-article","created":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T19:41:32Z","timestamp":1566243692000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Policy Adaptation in Hierarchical Attribute-based Access Control Systems"],"prefix":"10.1145","volume":"19","author":[{"given":"Saptarshi","family":"Das","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Kharagpur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4315-7329","authenticated-orcid":false,"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7420-6947","authenticated-orcid":false,"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers Business School, NJ, USA"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers Business School, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.01.005"},{"volume-title":"Proceedings of the International Conference on Collaboration and Internet Computing. 136--145","author":"Das S.","key":"e_1_2_1_3_1","unstructured":"S. Das , S. Sural , J. Vaidya , and V. Atluri . 2017. Policy adaptation in attribute-based access control for inter-organizational collaboration . In Proceedings of the International Conference on Collaboration and Internet Computing. 136--145 . S. Das, S. Sural, J. Vaidya, and V. Atluri. 2017. Policy adaptation in attribute-based access control for inter-organizational collaboration. In Proceedings of the International Conference on Collaboration and Internet Computing. 136--145."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/15M1055024"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084163"},{"key":"e_1_2_1_6_1","first-page":"800","article-title":"Guide to Attribute-Based Access Control (ABAC) Definition and Considerations","author":"Hu V. C.","year":"2014","unstructured":"V. C. Hu , D. Ferraiolo , D. R. Kuhn , A. Schnitzer , K. Sandlin , R. Miller , and K. Scarfone . 2014 . Guide to Attribute-Based Access Control (ABAC) Definition and Considerations . Technical Report. NIST Special Publication 800 - 162 . V. C. Hu, D. Ferraiolo, D. R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, and K. Scarfone. 2014. Guide to Attribute-Based Access Control (ABAC) Definition and Considerations. Technical Report. NIST Special Publication 800-162.","journal-title":"Technical Report. NIST Special Publication"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2016.0258"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377840"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880030"},{"volume-title":"Proceedings of the 21st IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec\u201907)","author":"Ray I.","key":"e_1_2_1_12_1","unstructured":"I. Ray and M. Toahchoodee . 2007. A spatio-temporal role-based access control model . In Proceedings of the 21st IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec\u201907) . 211--226. I. Ray and M. Toahchoodee. 2007. A spatio-temporal role-based access control model. In Proceedings of the 21st IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec\u201907). 211--226."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"volume-title":"Proceedings of the International Conference on Collaboration and Internet Computing. 339--348","author":"Talukdar T.","key":"e_1_2_1_17_1","unstructured":"T. Talukdar , G. Batra , J. Vaidya , V. Atluri , and S. Sural . 2017. Efficient bottom-up mining of attribute based access control policies . In Proceedings of the International Conference on Collaboration and Internet Computing. 339--348 . T. Talukdar, G. Batra, J. Vaidya, V. Atluri, and S. Sural. 2017. Efficient bottom-up mining of attribute based access control policies. In Proceedings of the International Conference on Collaboration and Internet Computing. 339--348."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377839"},{"volume-title":"Proceedings of the International Conference on Network and System Security. 191--205","author":"Vaidya J.","key":"e_1_2_1_19_1","unstructured":"J. Vaidya , B. Shafiq , V. Atluri , and D. Lorenzi . 2015. A framework for policy similarity evaluation and migration based on change detection . In Proceedings of the International Conference on Network and System Security. 191--205 . J. Vaidya, B. Shafiq, V. Atluri, and D. Lorenzi. 2015. A framework for policy similarity evaluation and migration based on change detection. In Proceedings of the International Conference on Network and System Security. 191--205."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_18"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323233","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323233","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:17Z","timestamp":1750202597000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,17]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,8,31]]}},"alternative-id":["10.1145\/3323233"],"URL":"https:\/\/doi.org\/10.1145\/3323233","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2019,8,17]]},"assertion":[{"value":"2018-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}