Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies 2018
DOI: 10.1145/3205977.3205984
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Learning Approach for Extracting Attributes of ABAC Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…For example, when a desired feature had the form p=True, where p is a path, the learned NN might give p=True high weight to s 1 , or the NN might give p=True lower weight to s 1 and compensate by giving its "complementary" feature p=False higher weight to s 0 ; both NNs can classify feature vectors accurately, and the objective function does not prefer one of them over the other. To ensure the desired feature is categorized as useful regardless of which NN is learned in this and similar situations, we select the 1 3 N uf features with the highest values of s 0…”
Section: Useful Feature Selectionmentioning
confidence: 99%
“…For example, when a desired feature had the form p=True, where p is a path, the learned NN might give p=True high weight to s 1 , or the NN might give p=True lower weight to s 1 and compensate by giving its "complementary" feature p=False higher weight to s 0 ; both NNs can classify feature vectors accurately, and the objective function does not prefer one of them over the other. To ensure the desired feature is categorized as useful regardless of which NN is learned in this and similar situations, we select the 1 3 N uf features with the highest values of s 0…”
Section: Useful Feature Selectionmentioning
confidence: 99%
“…Machine learning can help with converting natural language policies into formal access-control policies, e.g. through the identification of attributes in [1]. Policy analysis tools can identify excessive privileges and redundancies [9], establish privacy properties [12], and improve revocation schemes for delegation chains [13].…”
Section: Policy Analysis and Synthesismentioning
confidence: 99%
“…A decentralized app for accommodation sharing, e.g., may enable Consumer-To-Consumer (C2C) business models for the sharing of rooms, apartments or other facilities such that clients can directly formulate the access conditions to their own data and physical resources without a central organization having already access to such data and resources. 1 Such an approach requires, though, that clients as owners of physical resources can freely delegate the access of their own resources to others -under specific conditions that typically include or trigger financial transactions.…”
Section: Introductionmentioning
confidence: 99%
“…A top-down approach to ABAC policy mining has also been pursued, with the goal of using natural language processing and machine learning to extract ABAC policies from natural language documents. Since this problem is extremely difficult, the focus so far has been on sub-problems, such as analyzing natural language documents to identify the sentences relevant to access control [NTN18] and the relevant attributes [ATB18].…”
Section: Related Work On Abac Policy Miningmentioning
confidence: 99%