{"id":"https://openalex.org/W4413679618","doi":"https://doi.org/10.1109/csr64739.2025.11130033","title":"An Explainable Method for Access Control Policies Classification","display_name":"An Explainable Method for Access Control Policies Classification","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679618","doi":"https://doi.org/10.1109/csr64739.2025.11130033"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106467800","display_name":"Luca Petrillo","orcid":"https://orcid.org/0009-0000-3616-9244"},"institutions":[{"id":"https://openalex.org/I127077003","display_name":"IMT School for Advanced Studies Lucca","ror":"https://ror.org/035gh3a49","country_code":"IT","type":"education","lineage":["https://openalex.org/I127077003"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Luca Petrillo","raw_affiliation_strings":["IMT School for Advanced Studies Lucca,Lucca,Italy"],"affiliations":[{"raw_affiliation_string":"IMT School for Advanced Studies Lucca,Lucca,Italy","institution_ids":["https://openalex.org/I127077003"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101546784","display_name":"Fabio Martinelli","orcid":"https://orcid.org/0000-0002-6721-9395"},"institutions":[{"id":"https://openalex.org/I3005160176","display_name":"Institute for High Performance Computing and Networking","ror":"https://ror.org/04r5fge26","country_code":"IT","type":"facility","lineage":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabio Martinelli","raw_affiliation_strings":["Institute for High Performance Computing and Networking,National Research Council of Italy (CNR),Rende (CS),Italy"],"affiliations":[{"raw_affiliation_string":"Institute for High Performance Computing and Networking,National Research Council of Italy (CNR),Rende (CS),Italy","institution_ids":["https://openalex.org/I3005160176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004599844","display_name":"Antonella Santone","orcid":"https://orcid.org/0000-0002-2634-4456"},"institutions":[{"id":"https://openalex.org/I129627893","display_name":"University of Molise","ror":"https://ror.org/04z08z627","country_code":"IT","type":"education","lineage":["https://openalex.org/I129627893"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Antonella Santone","raw_affiliation_strings":["University of Molise,Campobasso,Italy"],"affiliations":[{"raw_affiliation_string":"University of Molise,Campobasso,Italy","institution_ids":["https://openalex.org/I129627893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023695406","display_name":"Francesco Mercaldo","orcid":"https://orcid.org/0000-0002-9425-1657"},"institutions":[{"id":"https://openalex.org/I129627893","display_name":"University of Molise","ror":"https://ror.org/04z08z627","country_code":"IT","type":"education","lineage":["https://openalex.org/I129627893"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesco Mercaldo","raw_affiliation_strings":["University of Molise,Campobasso,Italy"],"affiliations":[{"raw_affiliation_string":"University of Molise,Campobasso,Italy","institution_ids":["https://openalex.org/I129627893"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5106467800"],"corresponding_institution_ids":["https://openalex.org/I127077003"],"apc_list":null,"apc_paid":null,"fwci":4.416,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9468963,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"983","last_page":"989"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9143999814987183,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7169545888900757},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.550133466720581},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5128960609436035},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3230407238006592},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17113730311393738}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7169545888900757},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.550133466720581},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5128960609436035},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3230407238006592},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17113730311393738}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338440","display_name":"HORIZON EUROPE Health","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2028722148","https://openalex.org/W2114917462","https://openalex.org/W2150656895","https://openalex.org/W2536413803","https://openalex.org/W2793372807","https://openalex.org/W2884001105","https://openalex.org/W2914854069","https://openalex.org/W2999309192","https://openalex.org/W4313525584","https://openalex.org/W4367846179","https://openalex.org/W4387827708","https://openalex.org/W4387966251","https://openalex.org/W4388736795","https://openalex.org/W4389147566","https://openalex.org/W4391836235","https://openalex.org/W4399107506","https://openalex.org/W4401709300","https://openalex.org/W4403605341","https://openalex.org/W4406026208","https://openalex.org/W4406164337","https://openalex.org/W4411403346","https://openalex.org/W4412130408"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Access":[0,47],"control":[1,28],"is":[2],"one":[3],"of":[4,84,88,118],"the":[5,82,91,112,132,135],"most":[6],"fundamental":[7],"components":[8],"used":[9],"in":[10,52,116],"information":[11],"security":[12],"frameworks.":[13],"However,":[14],"as":[15,111],"organizations":[16],"increasingly":[17],"rely":[18],"on":[19,62],"digital":[20],"systems":[21],"to":[22,33,44,74,130],"manage":[23],"sensitive":[24],"data,":[25],"robust":[26,107],"access":[27],"has":[29],"also":[30],"become":[31],"critical":[32],"ensure":[34],"compliance":[35],"with":[36,109],"regulatory":[37],"requirements.":[38],"This":[39],"paper":[40],"proposes":[41],"a":[42,63],"method":[43],"automatically":[45],"classify":[46],"Control":[48],"Policies":[49],"(ACP)":[50],"described":[51],"Natural":[53],"Language":[54,94,99],"(NL)":[55],"using":[56],"different":[57,72,86],"transformer-based":[58],"architectures.":[59],"We":[60,78],"relied":[61],"dataset":[64],"created":[65],"from":[66,71],"real-world":[67],"requirements":[68],"specifications":[69],"and":[70,80,97],"domains":[73],"achieve":[75],"this":[76],"goal.":[77],"fine-tuned":[79],"compared":[81],"performance":[83,119],"two":[85,124],"types":[87],"models,":[89],"specifically":[90],"so-called":[92],"Small":[93],"Models":[95,100],"(SMLs)":[96],"Large":[98],"(LLMs).":[101],"The":[102],"experimental":[103],"findings":[104],"demonstrate":[105],"SMLs\u2019":[106],"performance,":[108],"ELECTRA-base-generator":[110],"best":[113],"among":[114],"them":[115],"terms":[117],"scores.":[120],"Moreover,":[121],"we":[122],"provide":[123],"explainability":[125],"measures":[126],"that":[127],"allow":[128],"us":[129],"understand":[131],"process":[133],"behind":[134],"classification.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
