An increasing body of work has recognized the importance of exploiting machine learning (ML) advancements to address the need for efficient automation in extracting access control attributes, policy mining, policy verification, access decisions, etc. In this work, we survey and summarize various ML approaches to solve different access control problems. We propose a novel taxonomy of the ML model's application in the access control domain. We highlight current limitations and open challenges such as lack of public real-world datasets, administration of ML-based access control systems, understanding a black-box ML model's decision, etc., and enumerate future research directions.Comment: Submitted to ACM Computing Surve
It is common to control access to critical information based on the need-to-know principle; The req...
Access control is the process of mediating every request to resources and data maintained by a syste...
In a set of access control policies, incompleteness is the existence of situations for which no poli...
The paper presents an approach based on machine learning to refine attribute-based access control p...
Access control technology is critical to the safe and reliable operation of information systems. How...
Access control systems are nowadays the first line of defence of modern IT systems. However, their e...
Abstract—While access control mechanisms have existed in computer systems since the 1960s, modern sy...
Learning objectives: Comprehend the principles behind access control mechanisms used in today\\\\\\...
peer reviewedAccess control (AC) is an important security mechanism used in software systems to rest...
Summary The security of access and information flow carries with it the risk that resources will be ...
The attribute-based access control (ABAC) model has been gaining popularity in recent years because ...
Access control lists (ACLs) are a commonly used mechanism to limit the distribution of data in an or...
Mode of access: World Wide WebTheoretical thesis.Bibliography pages 39-411 Introduction -- 2 Researc...
This paper tackles the problem of usability and security in access control mechanisms. A theoretica...
Abstract—Role-based access control (RBAC) is very widely used but has notable limitations, prompting...
It is common to control access to critical information based on the need-to-know principle; The req...
Access control is the process of mediating every request to resources and data maintained by a syste...
In a set of access control policies, incompleteness is the existence of situations for which no poli...
The paper presents an approach based on machine learning to refine attribute-based access control p...
Access control technology is critical to the safe and reliable operation of information systems. How...
Access control systems are nowadays the first line of defence of modern IT systems. However, their e...
Abstract—While access control mechanisms have existed in computer systems since the 1960s, modern sy...
Learning objectives: Comprehend the principles behind access control mechanisms used in today\\\\\\...
peer reviewedAccess control (AC) is an important security mechanism used in software systems to rest...
Summary The security of access and information flow carries with it the risk that resources will be ...
The attribute-based access control (ABAC) model has been gaining popularity in recent years because ...
Access control lists (ACLs) are a commonly used mechanism to limit the distribution of data in an or...
Mode of access: World Wide WebTheoretical thesis.Bibliography pages 39-411 Introduction -- 2 Researc...
This paper tackles the problem of usability and security in access control mechanisms. A theoretica...
Abstract—Role-based access control (RBAC) is very widely used but has notable limitations, prompting...
It is common to control access to critical information based on the need-to-know principle; The req...
Access control is the process of mediating every request to resources and data maintained by a syste...
In a set of access control policies, incompleteness is the existence of situations for which no poli...