Using constraint programming and graph representation learning for generating interpretable cloud security policies

Modern software systems rely on mining insights from business sensitive data stored in public clouds. A data breach usually incurs signifcant (monetary) loss for a commercial organization. Conceptually, cloud security heavily relies on Identity Access Management (IAM) policies that IT admins need to...

Full description

Saved in:
Bibliographic Details
Main Authors: KAZDAGLI, Mikhail, TIWARI, Mohit, KUMAR, Akshat
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2022
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7717
https://ink.library.smu.edu.sg/context/sis_research/article/8720/viewcontent/Using_constraint_programming_and_graph_representation_learning_for_generating_interpretable_cloud_security_policies.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English