A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

Toward deep learning based access control

MN Nobi, R Krishnan, Y Huang, M Shakarami… - Proceedings of the …, 2022 - dl.acm.org
A common trait of current access control approaches is the challenging need to engineer
abstract and intuitive access control models. This entails designing access control …

ABAC policy mining method based on hierarchical clustering and relationship extraction

S Shang, X Wang, A Liu - Computers & Security, 2024 - Elsevier
With the rapid development of information technology, the traditional access control model
has faced challenges in meeting the demands of practical applications. As a result, the …

A decision tree learning approach for mining relationship-based access control policies

T Bui, SD Stoller - Proceedings of the 25th ACM Symposium on Access …, 2020 - dl.acm.org
Relationship-based access control (ReBAC) provides a high level of expressiveness and
flexibility that promotes security and information sharing, by allowing policies to be …

Learning attribute-based and relationship-based access control policies with unknown values

T Bui, SD Stoller - International Conference on Information Systems …, 2020 - Springer
Abstract Attribute-Based Access Control (ABAC) and Relationship-based access control
(ReBAC) provide a high level of expressiveness and flexibility that promote security and …

An on-the-fly framework for usable access control policy mining

Y Guo, X Wang, M Yu, F Li, Z Pang, L Fang - Computers & Security, 2025 - Elsevier
Access control policy mining, which extracts or infers access control policies from existing
system logs or configurations within a given environment, is widely applied in policy …

Learning relationship-based access control policies from black-box systems

P Iyer, A Masoumzadeh - ACM Transactions on Privacy and Security, 2022 - dl.acm.org
Access control policies are crucial in securing data in information systems. Unfortunately,
often times, such policies are poorly documented, and gaps between their specification and …

[BUCH][B] Machine Learning Techniques for Cybersecurity

E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim… - 2023 - Springer
The protection of information and information infrastructures from unauthorized access, use,
disclosure, disruption, modification, or destruction is today more critical than ever as they …

Mining attribute-based access control policies

M Davari, M Zulkernine - International Conference on Information Systems …, 2022 - Springer
The flexibility feature of Attribute-Based Access Control (ABAC) makes it a powerful access
control model for supporting the authorization demands of complex and dynamic systems …

Automated Generation and Update of Structured ABAC Policies

A Bamberger, M Fernández - Proceedings of the 2024 ACM Workshop …, 2024 - dl.acm.org
Access control is nowadays ubiquitous in physical and software systems and has been the
subject of a wide range of studies. Many of these studies have focused on Role-Based …