Proceedings of the 20th ACM Symposium on Access Control Models and Technologies 2015
DOI: 10.1145/2752952.2752958
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques

Abstract: Role Based Access Control (RBAC) is the most widely used model for access control due to the ease of administration as well as economic benefits it provides. In order to deploy an RBAC system, one requires to first identify a complete set of roles. This process, known as role engineering, has been identified as one of the costliest tasks in migrating to RBAC. In this paper, we propose a top-down role engineering approach and take the first steps towards using natural language processing techniques to extract p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 4 publications
(8 reference statements)
0
14
0
Order By: Relevance
“…1. Several studies have researched challenges and opportunities faced by natural language processing (NLP) applications in the automation of the second phase of the cycle, named "gather authorization requirements" (Xiao et al 2012;Slankas and Williams 2013;Slankas et al 2014;Narouei and Takabi 2015a). Our work complements these prior efforts to aid security architects in the process of deriving required attributes from natural language authorization requirements, which is the third phase of the lifecycle.…”
Section: Abac Policy Authoringmentioning
confidence: 98%
See 2 more Smart Citations
“…1. Several studies have researched challenges and opportunities faced by natural language processing (NLP) applications in the automation of the second phase of the cycle, named "gather authorization requirements" (Xiao et al 2012;Slankas and Williams 2013;Slankas et al 2014;Narouei and Takabi 2015a). Our work complements these prior efforts to aid security architects in the process of deriving required attributes from natural language authorization requirements, which is the third phase of the lifecycle.…”
Section: Abac Policy Authoringmentioning
confidence: 98%
“…This boost of recall, however, comes at the cost of precision. While we are aware that the lack of benchmark dataset makes the comparison task non-trivial, the reported results suggest that a combination of policy extraction approaches by Slankas et al (2014) and Narouei and Takabi (2015a) can potentially balance both precision and recall values. Further, Narouei et al (2018) investigated the idea of improving SRL performance using domain adaptation techniques.…”
Section: Natural Language and Access Control Policymentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm described the relationship among roles by attribute information. Narouei et al [32] proposed a novel top-down role engineering approach that used natural language processing techniques to extract roles from documents. Kumar et al [33] proposed a constrained role mining scheme (CRM).…”
Section: Related Workmentioning
confidence: 99%
“…In our previous work, we proposed semantic role labeling (SRL) to automatically extract ACP elements from unrestricted natural language documents, define roles, and build an RBAC model [20]. We did not attempt to identify ACP sentences, but instead used the already extracted sentences by [25] and left implementing the ACP sentence identification step for future work.…”
Section: Related Workmentioning
confidence: 99%