Toward deep learning based access control

MN Nobi, R Krishnan, Y Huang, M Shakarami… - Proceedings of the …, 2022 - dl.acm.org
A common trait of current access control approaches is the challenging need to engineer
abstract and intuitive access control models. This entails designing access control …

Machine learning in access control: A taxonomy and survey

MN Nobi, M Gupta, L Praharaj, M Abdelsalam… - arxiv preprint arxiv …, 2022 - arxiv.org
An increasing body of work has recognized the importance of exploiting machine learning
(ML) advancements to address the need for efficient automation in extracting access control …

Polisma-a framework for learning attribute-based access control policies

A Abu Jabal, E Bertino, J Lobo, M Law, A Russo… - … –ESORICS 2020: 25th …, 2020 - Springer
Attribute-based access control (ABAC) is being widely adopted due to its flexibility and
universality in capturing authorizations in terms of the properties (attributes) of users and …

[HTML][HTML] A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art

MS Ahsan, ASK Pathan - IoT, 2025 - mdpi.com
The Internet of Things (IoT) is a technologyof connecting billions of devices with
heterogeneous types and capabilities. Even though it is an attractive environment that could …

Administration of machine learning based access control

MN Nobi, R Krishnan, Y Huang, R Sandhu - European Symposium on …, 2022 - Springer
When the access control state of a system is complex, Machine learning (ML)-based access
control decision engines have demonstrated advantages of accuracy and generalizability …

Enhanced adaptable and distributed access control decision making model based on machine learning for policy conflict resolution in BYOD environment

AT Ayedh M, AWA Wahab, MYI Idris - Applied Sciences, 2023 - mdpi.com
Organisations are adopting new IT strategies such as “Bring Your Own Device”(BYOD) and
remote working. These trends are highly beneficial both for enterprise owners and …

ABAC Policy Mining through Affiliation Networks and Biclique Analysis

A Perez-Haro, A Diaz-Perez - Information, 2024 - mdpi.com
Policy mining is an automated procedure for generating access rules by means of mining
patterns from single permissions, which are typically registered in access logs. Attribute …

The State-of-the-Art Access Control Models in IoT: A Survey on the Requirements, Scale, and Future Challenges

MS Ahsan, ASK Pathan - Scale, and Future Challenges, 2024 - papers.ssrn.com
Abstract The Internet of Things (IoT) is a grand vision of connecting billions of devices with
heterogeneous types and capabilities. Even though it is an attractive environment that could …

Attribute-based access control policy generation approach from access logs based on the catboost

S Quan, Y Zhao, N Helil - Computing and Informatics, 2023 - cai.sk
Attribute-based access control (ABAC) has higher flexibility and better scalability than
traditional access control and can be used for fine-grained access control of large-scale …

Beyond Traditional Methods: Deep Learning with Data Augmentation for Robust Access Control

M Al Lail, D Pinto, LA Almanza… - 2024 33rd …, 2024 - ieeexplore.ieee.org
Access control systems in large organizations often struggle with managing complex
policies and workloads. However, there is potential for deep learning models to address …