Optimization of access control policies
Organizations undertake complex and costly projects to model high-quality Access Control
Policies (ACPs). Once built, these policies must be maintained and managed in an ongoing …
Policies (ACPs). Once built, these policies must be maintained and managed in an ongoing …
Inductive learning of answer set programs for autonomous surgical task planning: Application to a training task for surgeons
The quality of robot-assisted surgery can be improved and the use of hospital resources can
be optimized by enhancing autonomy and reliability in the robot's operation. Logic …
be optimized by enhancing autonomy and reliability in the robot's operation. Logic …
A generative policy model for connected and autonomous vehicles
Artificial Intelligence is rapidly enhancing human capability by providing support and
guidance on a wide variety of tasks. However, one of the main challenges for autonomous …
guidance on a wide variety of tasks. However, one of the main challenges for autonomous …
Federated learning for coalition operations
Machine Learning in coalition settings requires combining insights available from data
assets and knowledge repositories distributed across multiple coalition partners. In tactical …
assets and knowledge repositories distributed across multiple coalition partners. In tactical …
Exploring ILASP Through Logic Puzzles Modelling
T Dreossi - CEUR WORKSHOP PROCEEDINGS, 2023 - air.uniud.it
ILASP (Inductive Learning of Answer Set Programs) is a logic-based machine learning
system. It makes use of existing knowledge base, containing anything known before the …
system. It makes use of existing knowledge base, containing anything known before the …
[PDF][PDF] Using ILP to Learn AppArmor Policies.
L Brodschelm, M Gelderie - ICISSP, 2024 - researchgate.net
Access control has become ubiquitous in contemporary computer systems but creating
policies is an costly and errorprone task, thus it is desirable to automize it. Machine learning …
policies is an costly and errorprone task, thus it is desirable to automize it. Machine learning …
On the impact of generative policies on security metrics
Policy based Security Management in an accepted practice in the industry, and required to
simplify the administrative overhead associated with security management in complex …
simplify the administrative overhead associated with security management in complex …
Managing training data from untrusted partners using self-generating policies
D Verma, S Calo, S Witherspoon… - … Learning for Multi …, 2019 - spiedigitallibrary.org
When training data for machine learning is obtained from many different sources, not all of
which may be trusted, it is difficult to determine which training data to accept and which to …
which may be trusted, it is difficult to determine which training data to accept and which to …
Inference for Trustworthy Machine Intelligence: Challenges and Solutions
DC Verma - 2022 IEEE 4th International Conference on …, 2022 - ieeexplore.ieee.org
In order to create AI/ML based solutions that will be trusted during production, issues that
hamper usage of AI models in practical solutions needs to be addressed. Despite a …
hamper usage of AI models in practical solutions needs to be addressed. Despite a …
Using an asg based generative policy to model human rules
Generative policies have recently been researched to provide a method for next generation
security policies. They are created using either traditional machine learning techniques or …
security policies. They are created using either traditional machine learning techniques or …