Machine learning in access control: A taxonomy and survey
An increasing body of work has recognized the importance of exploiting machine learning
(ML) advancements to address the need for efficient automation in extracting access control …
(ML) advancements to address the need for efficient automation in extracting access control …
SoK: Access Control Policy Generation from High-level Natural Language Requirements
SH Jayasundara… - ACM Computing …, 2024 - dl.acm.org
Administrator-centered access control failures can cause data breaches, putting
organizations at risk of financial loss and reputation damage. Existing graphical policy …
organizations at risk of financial loss and reputation damage. Existing graphical policy …
GDPR-based user stories in the access control perspective
Because of GDPR's principle of “data protection by design and by default”, organizations
who wish to stay lawful have to re-think their data practices. Access Control (AC) can be a …
who wish to stay lawful have to re-think their data practices. Access Control (AC) can be a …
User Authorization in Microservice-Based Applications
N Sänger, S Abeck - Software, 2023 - mdpi.com
Microservices have emerged as a prevalent architectural style in modern software
development, replacing traditional monolithic architectures. The decomposition of business …
development, replacing traditional monolithic architectures. The decomposition of business …
基于深度学习的ABAC 访问控制策略自动化生成技术
刘敖迪, 杜学绘, 王娜, 乔蕊 - 通信学报, 2020 - infocomm-journal.com
针对访问控制策略的自动化生成问题, 提出了一种基于深度学习的ABAC
访问控制策略生成框架, 从自然语言文本中提取基于属性的访问控制策略, 该技术能够显著降低 …
访问控制策略生成框架, 从自然语言文本中提取基于属性的访问控制策略, 该技术能够显著降低 …
Automated extraction of abac policies from natural-language documents in healthcare systems
Y Xia, S Zhai, Q Wang, H Hou, Z Wu… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The healthcare system is a distributed collaborative system and the sensitivity of the medical
data is one of the most important requirements. Preventing unauthorized access to …
data is one of the most important requirements. Preventing unauthorized access to …
Synthesizing and analyzing attribute-based access control model generated from natural language policy statements
Access control policies (ACPs) are natural language statements that describe criteria under
which users can access resources. We focus on constructing NIST Next Generation Access …
which users can access resources. We focus on constructing NIST Next Generation Access …
Environment Aware Deep Learning Based Access Control Model
ABSTRACT Recently Deep Learning based Access Control (DLBAC) model has been
developed to reduce the burden of access control model engineering on a human …
developed to reduce the burden of access control model engineering on a human …
Statement Recognition of Access Control Policies in IoT Networks
L Ma, Z Yang, Z Bu, Q Lao, W Yang - Sensors, 2023 - mdpi.com
Access Control Policies (ACPs) are essential for ensuring secure and authorized access to
resources in IoT networks. Recognizing these policies involves identifying relevant …
resources in IoT networks. Recognizing these policies involves identifying relevant …
RAGent: Retrieval-based Access Control Policy Generation
SH Jayasundara, NAG Arachchilage… - arXiv preprint arXiv …, 2024 - arxiv.org
Manually generating access control policies from an organization's high-level requirement
specifications poses significant challenges. It requires laborious efforts to sift through …
specifications poses significant challenges. It requires laborious efforts to sift through …