Machine learning in access control: A taxonomy and survey

MN Nobi, M Gupta, L Praharaj, M Abdelsalam… - arXiv preprint arXiv …, 2022 - arxiv.org
An increasing body of work has recognized the importance of exploiting machine learning
(ML) advancements to address the need for efficient automation in extracting access control …

SoK: Access Control Policy Generation from High-level Natural Language Requirements

SH Jayasundara… - ACM Computing …, 2024 - dl.acm.org
Administrator-centered access control failures can cause data breaches, putting
organizations at risk of financial loss and reputation damage. Existing graphical policy …

GDPR-based user stories in the access control perspective

C Bartolini, S Daoudagh, G Lenzini… - … Conference on the Quality …, 2019 - Springer
Because of GDPR's principle of “data protection by design and by default”, organizations
who wish to stay lawful have to re-think their data practices. Access Control (AC) can be a …

User Authorization in Microservice-Based Applications

N Sänger, S Abeck - Software, 2023 - mdpi.com
Microservices have emerged as a prevalent architectural style in modern software
development, replacing traditional monolithic architectures. The decomposition of business …

基于深度学习的ABAC 访问控制策略自动化生成技术

刘敖迪, 杜学绘, 王娜, 乔蕊 - 通信学报, 2020 - infocomm-journal.com
针对访问控制策略的自动化生成问题, 提出了一种基于深度学习的ABAC
访问控制策略生成框架, 从自然语言文本中提取基于属性的访问控制策略, 该技术能够显著降低 …

Automated extraction of abac policies from natural-language documents in healthcare systems

Y Xia, S Zhai, Q Wang, H Hou, Z Wu… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The healthcare system is a distributed collaborative system and the sensitivity of the medical
data is one of the most important requirements. Preventing unauthorized access to …

Synthesizing and analyzing attribute-based access control model generated from natural language policy statements

M Abdelgawad, I Ray, S Alqurashi… - Proceedings of the 28th …, 2023 - dl.acm.org
Access control policies (ACPs) are natural language statements that describe criteria under
which users can access resources. We focus on constructing NIST Next Generation Access …

Environment Aware Deep Learning Based Access Control Model

P Chhetri, S Bhatt, P Bhatt, MN Nobi, J Benson… - Proceedings of the …, 2024 - dl.acm.org
ABSTRACT Recently Deep Learning based Access Control (DLBAC) model has been
developed to reduce the burden of access control model engineering on a human …

Statement Recognition of Access Control Policies in IoT Networks

L Ma, Z Yang, Z Bu, Q Lao, W Yang - Sensors, 2023 - mdpi.com
Access Control Policies (ACPs) are essential for ensuring secure and authorized access to
resources in IoT networks. Recognizing these policies involves identifying relevant …

RAGent: Retrieval-based Access Control Policy Generation

SH Jayasundara, NAG Arachchilage… - arXiv preprint arXiv …, 2024 - arxiv.org
Manually generating access control policies from an organization's high-level requirement
specifications poses significant challenges. It requires laborious efforts to sift through …