Evolutionary Inference of Attribute-based Access Control Policies Eric Medvet1 , Alberto Bartoli1 , Barbara Carminati2 , and Elena Ferrari2 2

A

1 Dip. di Ingegneria e Architettura, Universit` a degli Studi di Trieste, Italy Dip. di Scienze Teoriche e Applicate, Universit` a degli Studi dell’Insubria, Italy

Appendix: Genetic operators

The mutation operators are the following, given a parent rule ρ = heU , eR , O, ci— for the operators described using the placeholder ∗, the operator is actually applied with ∗ = U or ∗ = R with equal probability. Attribute expression addition An a∗ ∈ A∗ is randomly chosen such that e∗ (a∗ ) = >, then e∗ (a∗ ) := {v} with v randomly chosen in V∗ (a∗ ), if a∗ ∈ A∗,1 , or e∗ (a∗ ) := {s} with s randomly chosen in Set(V∗ (a∗ )), if a∗ ∈ A∗,∞ . Attribute expression removal An a∗ ∈ A∗ is randomly chosen such that e∗ (a∗ ) 6= >, then e∗ (a∗ ) := >. Single-valued addition An a∗,1 ∈ A∗,1 is randomly chosen such that e∗ (a∗,1 ) 6= >, then e∗ (a∗,1 ) := e∗ (a∗,1 )∪v with v randomly chosen in V∗ (a∗,1 )\e∗ (a∗,1 ). Single-valued removal An a∗,1 ∈ A∗,1 is randomly chosen such that e∗ (a∗,1 ) 6= >, then e∗ (a∗,1 ) := e∗ (a∗,1 )\v with v randomly chosen in e∗ (a∗,1 ); if e∗ (a∗,1 ) becomes empty, then e∗ (a∗,1 ) := >. Multi-valued addition An a∗,∞ ∈ A∗,∞ is randomly chosen such that e∗ (a∗,∞ ) 6= > and a set s ∈ e∗ (a∗,∞ ) is randomly chosen, then s := s∪v with v randomly chosen in V∗ (a∗,∞ ) \ s. Multi-valued removal An a∗,∞ ∈ A∗,∞ is randomly chosen such that e∗ (a∗,∞ ) 6= > and a set s ∈ e∗ (a∗,∞ ) is randomly chosen, then s := s\v with v randomly chosen in s; if s becomes empty, then it is removed from e∗ (a∗,∞ ), if e∗ (a∗,∞ ) becomes empty, then e∗ (a∗,∞ ) := >. Constraint addition A pair aU , aR ∈ AU × AR is randomly chosen such that c(aU , aR ) = > and VU (aU ) ∩ VR (aR ) 6= ∅ (i.e., aU and aR have some values in common), then c(aU , aR ) := ¬>. Constraint removal A pair aU , aR ∈ AU × AR is randomly chosen such that c(aU , aR ) = ¬>, then c(aU , aR ) := >. Operation addition An operation o ∈ O is randomly chosen such that o ∈ / O, then O := O ∪ {o}. Operation removal An operation o ∈ O is randomly chosen such that o ∈ O, then O := O \ {o}. The crossover operators are the following, given two parent rules ρ1 = heU,1 , eR,1 , O1 , c1 i and ρ2 = heU,2 , eR,2 , O2 , c2 i. The child rule is ρ1 after the actual application of the operator.

2

Eric Medvet, Alberto Bartoli, Barbara Carminati, and Elena Ferrari

Attribute expression donation An a∗ ∈ A∗ is randomly chosen such that e∗,1 (a∗ ) = > ∧ e∗,2 (a∗ ) 6= >, then e∗,1 (a∗ ) := e∗,2 (a∗ ). Single-valued donation An a∗,1 ∈ A∗,1 is randomly chosen such that e∗,1 (a∗,1 ) 6= > ∧ e∗,2 (a∗,1 ) 6= >, then e∗,1 (a∗,1 ) := e∗,1 (a∗,1 ) ∪ v with v randomly chosen in e∗,2 (a∗,1 ). Multi-valued donation An a∗,∞ ∈ A∗,∞ is randomly chosen such that e∗,1 (a∗,∞ ) 6= > ∧ e∗,2 (a∗,∞ ) 6= > and two sets s1 ∈ e∗,1 (a∗,∞ ), s2 ∈ e∗,2 (a∗,∞ ) are randomly chosen, then s1 ∪ v with v randomly chosen in s2 . Constraint donation A pair aU , aR ∈ AU × AR is randomly chosen such that c1 (aU , aR ) = > ∧ c2 (aU , aR ) = ¬>, then c1 (aU , aR ) := c2 (aU , aR ). Operation donation An operation o ∈ O2 is randomly chosen such that o ∈ / O1 , then O1 := O1 ∪ {o}. When a genetic operator cannot be applied (e.g., when O1 = O for the operation donation crossover operator), the generated rule is set equal to the (first) parent.

Evolutionary Inference of Attribute-based Access ...

The mutation operators are the following, given a parent rule ρ = 〈eU ,eR, O, c〉— for the operators described using the placeholder ∗, the operator is actually.

111KB Sizes 3 Downloads 174 Views

Recommend Documents

Inference-Based Access Control for Unstructured Data - Liz Stinson
Apr 21, 2009 - Virtual Private Database (VPD) Oracle's VPD entails dy- namically rewriting ..... IBM Database Magazine Quarter 1, 2007, Vol. 12,. Issue 1 (May ...

Theoretical Foundations of Evolutionary Computation
Per Kristian Lehre, University of Birmingham, UK. [email protected]. Frank Neumann, Max Planck Institute for Informatics, Germany. [email protected]. Jonathan E. Rowe, University of Birmingham, UK. [email protected]. Xin Yao, University o

Bayesian Inference of Viral Recombination
Bayesian Inference of Viral Recombination: Topology distance between DNA segments and its distribution. DNA. Leonardo de Oliveira Martins ...

Nullable Type Inference - OCaml
Dec 11, 2002 - [1] Apple (2014): Swift, a new programming language for iOS and. OS X. Available at https://developer.apple.com/swift. [2] Facebook (2014): ...

inference-progressions-teaching - CensusAtSchool
Reinforcing & developing ANALYSIS statements. - Comparative descriptions of sample distributions. → always use variable, value, unit. → centres (medians), shift/overlap (position of middle 50% relative to each other), spread. (IQR – consistency

Variational Program Inference - arXiv
If over the course of an execution path x of ... course limitations on what the generated program can do. .... command with a prior probability distribution PC , the.

Variational Program Inference - arXiv
reports P(e|x) as the product of all calls to a function: .... Evaluating a Guide Program by Free Energy ... We call the quantity we are averaging the one-run free.

Nullable Type Inference - OCaml
Dec 11, 2002 - Imperative programming languages, such as C or Java deriva- tives, make abundant ... In languages using the ML type discipline, the option type type α option ..... //docs.hhvm.com/manual/en/hack.nullable.php. [3] Facebook ...

Evolutionary game dynamics of controlled and ... - Squarespace
Jul 27, 2015 - simulations that support this suggestion.26 In these simula- ... pA for automatic agents and pC for controlled agents. ..... 365, 19–30 (2010).

Efficient Generation of Evolutionary Trees
We give an algorithm to generate all evolutionary trees having n ordered .... sent such trees with n species with a sequence of (n−2) numbers. Let T(n) be the set ...

Current Evolutionary Adaptiveness of Psychiatric Disorders: Fertility ...
1 Note that two stages were required due to current software limitations, wherein current software is ...... Newbury Park, CA: Sage. Wood, S. (2014). Package ...

Evolutionary game dynamics of controlled and ... - Squarespace
Jul 27, 2015 - evolution of automatic and controlled decision-making processes. We introduce a ..... where for the sake of illustration we fix a¼0.15 and vary b and q. ..... tion to, variation caused by the population).33,34 Our basic framework ...

Evolutionary determinants of war!
Nov 14, 2014 - (1979) argues that there is no effect of the power distribution on the likelihood of war ..... For illustration, we may think of these as the leaders or the govern& ...... [50] Slantchev, Branislav L., and Ahmer Tarar, 2011, Mutual ...

inference-progressions-teaching - CensusAtSchool
show up consistently if we repeatedly sampled. → introduce ... Don't “POP in your PEE” – student ANALYSIS descriptions (PEE) often include the population.

Efficient Generation of Evolutionary Trees
SAIDUR RAHMAN. 2. Department of Computer Science and Engineering. Bangladesh ... 20 millions of years ago. Raccoon. Monkey ... plete binary tree with n leaves by a sequence of (n−2) numbers. ... vertex of degree 1. Each vertex in a tree ...

The probability of evolutionary rescue
titative predictions. Here, we propose general analytical predictions, based ... per capita rate of rescue, can be estimated from fits of empirical data. Finally,.

Current Evolutionary Adaptiveness of Psychiatric Disorders: Fertility ...
2016, Vol. 125, No. 6, 000. 0021-843X/16/$12.00 http://dx.doi.org/10.1037/abn0000185. 1 ..... a hierarchical DSM–5 organization, nesting anxiety, posttraumatic.

Efficient Generation of Evolutionary Trees
cycle-free connected graph, but to a biologist it represents a series of hypotheses ... International Conference on Information and Communication Technology. ICICT 2007, 7-9 ..... bridge, Massachusetts, London, England, 2004. [4] S. Kawano ...

Evolutionary Significance of Iodine
Iodine is one of the most electron-rich atoms in the diet of marine and terrestrial organisms, and it enters cells via iodide ..... become cancerous [50,77,78].

Evolutionary Psychology
Oct 9, 1997 - June 12 and June 26] calls its ideas and their proponents "foolish," .... Director, McDonnell-Pew Center for ... to find Steven Pinker, a linguist by training, upended by his own use of ... selection is the agent of modification.

Memory in Inference
the continuity of the inference, e.g. when I look out of the window at a bird while thinking through a problem, but this should not blind us to the existence of clear cases of both continuous and interrupted inferences. Once an inference has been int