Using constraint programming and graph representation learning for generating interpretable cloud security policies
Modern software systems rely on mining insights from business sensitive data stored in public clouds. A data breach usually incurs signifcant (monetary) loss for a commercial organization. Conceptually, cloud security heavily relies on Identity Access Management (IAM) policies that IT admins need to...
Saved in:
Main Authors: | KAZDAGLI, Mikhail, TIWARI, Mohit, KUMAR, Akshat |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7717 https://ink.library.smu.edu.sg/context/sis_research/article/8720/viewcontent/Using_constraint_programming_and_graph_representation_learning_for_generating_interpretable_cloud_security_policies.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Automated Generation of Interaction Graphs for Value-Factored Decentralized POMDPs
by: YEOH, William, et al.
Published: (2013) -
Sample-efficient iterative lower bound optimization of deep reactive policies for planning in continuous MDPs
by: LOW, Siow Meng, et al.
Published: (2022) -
H-DPOP: Using Hard Constraints for Search Space Pruning in DCOP
by: KUMAR, Akshat, et al.
Published: (2008) -
Influence Diagrams With Memory States: Representation and Algorithms
by: WU, Xiaojian, et al.
Published: (2011) -
Distributed Constraint Optimization with Structured Resource Constraints
by: KUMAR, Akshat, et al.
Published: (2009)