- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0005000000000000
- More
- Availability
-
50
- Author / Contributor
- Filter by Author / Creator
-
-
Tiwari, Mohit (4)
-
Austin Harris, Tarunesh Verma (1)
-
Espinoza, Antonio M (1)
-
Forrest, Stephanie (1)
-
Harris, Austin (1)
-
Hu, Yang (1)
-
Kazdagli, Mikhail (1)
-
Khurshid, Sarfraz (1)
-
Kumar, Akshat (1)
-
Lin, Calvin (1)
-
McMillan, Kenneth L (1)
-
Ramrakhyani, Prakash (1)
-
Wang, Wenxi (1)
-
Wei, Shijia (1)
-
Wood, Riley (1)
-
Zhu, Yongye (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Hu, Yang; Wang, Wenxi; Khurshid, Sarfraz; McMillan, Kenneth L; Tiwari, Mohit (, IEEE)
-
Kazdagli, Mikhail; Tiwari, Mohit; Kumar, Akshat (, International Joint Conferences on Artificial Intelligence Organization)Modern software systems rely on mining insights from business sensitive data stored in public clouds. A data breach usually incurs significant (monetary) loss for a commercial organization. Conceptually, cloud security heavily relies on Identity Access Management (IAM) policies that IT admins need to properly configure and periodically update. Security negligence and human errors often lead to misconfiguring IAM policies which may open a backdoor for attackers. To address these challenges, first, we develop a novel framework that encodes generating optimal IAM policies using constraint programming (CP). We identify reducing dormant permissions of cloud users as an optimality criterion, which intuitively implies minimizing unnecessary datastore access permissions. Second, to make IAM policies interpretable, we use graph representation learning applied to historical access patterns of users to augment our CP model with similarity constraints: similar users should be grouped together and share common IAM policies. Third, we describe multiple attack models and show that our optimized IAM policies significantly reduce the impact of security attacks using real data from 8 commercial organizations, and synthetic instances.more » « less
-
Espinoza, Antonio M; Wood, Riley; Forrest, Stephanie; Tiwari, Mohit (, IEEE)
-
Austin Harris, Tarunesh Verma (, Hardware Oriented Security and Trust (HOST))
An official website of the United States government
