A survey on empirical security analysis of access-control systems: a real-world perspective
S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
Toward deep learning based access control
A common trait of current access control approaches is the challenging need to engineer
abstract and intuitive access control models. This entails designing access control …
abstract and intuitive access control models. This entails designing access control …
ABAC policy mining method based on hierarchical clustering and relationship extraction
S Shang, X Wang, A Liu - Computers & Security, 2024 - Elsevier
With the rapid development of information technology, the traditional access control model
has faced challenges in meeting the demands of practical applications. As a result, the …
has faced challenges in meeting the demands of practical applications. As a result, the …
A decision tree learning approach for mining relationship-based access control policies
T Bui, SD Stoller - Proceedings of the 25th ACM Symposium on Access …, 2020 - dl.acm.org
Relationship-based access control (ReBAC) provides a high level of expressiveness and
flexibility that promotes security and information sharing, by allowing policies to be …
flexibility that promotes security and information sharing, by allowing policies to be …
Learning attribute-based and relationship-based access control policies with unknown values
T Bui, SD Stoller - International Conference on Information Systems …, 2020 - Springer
Abstract Attribute-Based Access Control (ABAC) and Relationship-based access control
(ReBAC) provide a high level of expressiveness and flexibility that promote security and …
(ReBAC) provide a high level of expressiveness and flexibility that promote security and …
An on-the-fly framework for usable access control policy mining
Y Guo, X Wang, M Yu, F Li, Z Pang, L Fang - Computers & Security, 2025 - Elsevier
Access control policy mining, which extracts or infers access control policies from existing
system logs or configurations within a given environment, is widely applied in policy …
system logs or configurations within a given environment, is widely applied in policy …
Learning relationship-based access control policies from black-box systems
P Iyer, A Masoumzadeh - ACM Transactions on Privacy and Security, 2022 - dl.acm.org
Access control policies are crucial in securing data in information systems. Unfortunately,
often times, such policies are poorly documented, and gaps between their specification and …
often times, such policies are poorly documented, and gaps between their specification and …
[BUCH][B] Machine Learning Techniques for Cybersecurity
The protection of information and information infrastructures from unauthorized access, use,
disclosure, disruption, modification, or destruction is today more critical than ever as they …
disclosure, disruption, modification, or destruction is today more critical than ever as they …
Mining attribute-based access control policies
M Davari, M Zulkernine - International Conference on Information Systems …, 2022 - Springer
The flexibility feature of Attribute-Based Access Control (ABAC) makes it a powerful access
control model for supporting the authorization demands of complex and dynamic systems …
control model for supporting the authorization demands of complex and dynamic systems …
Automated Generation and Update of Structured ABAC Policies
A Bamberger, M Fernández - Proceedings of the 2024 ACM Workshop …, 2024 - dl.acm.org
Access control is nowadays ubiquitous in physical and software systems and has been the
subject of a wide range of studies. Many of these studies have focused on Role-Based …
subject of a wide range of studies. Many of these studies have focused on Role-Based …