{"id":"https://openalex.org/W7084155307","doi":"https://doi.org/10.1109/icc52391.2025.11161387","title":"Path-Aware Access Control: Granting Access with Transit Network Attributes","display_name":"Path-Aware Access Control: Granting Access with Transit Network Attributes","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W7084155307","doi":"https://doi.org/10.1109/icc52391.2025.11161387"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11161387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jonghoon Kwon","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jonghoon Kwon","raw_affiliation_strings":["ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Julian Modanese","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Julian Modanese","raw_affiliation_strings":["ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jordi Subir\u00e0 Nieto","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jordi Subir\u00e0 Nieto","raw_affiliation_strings":["ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Adrian Perrig","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adrian Perrig","raw_affiliation_strings":["ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Z&#x00FC;rich,Switzerland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.6686,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.94409074,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2623","last_page":"2628"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12728","display_name":"Demographic Trends and Gender Preferences","score":0.09269999712705612,"subfield":{"id":"https://openalex.org/subfields/3318","display_name":"Gender Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12728","display_name":"Demographic Trends and Gender Preferences","score":0.09269999712705612,"subfield":{"id":"https://openalex.org/subfields/3318","display_name":"Gender Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13399","display_name":"Unemployment and Economic Growth","score":0.07100000232458115,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14499","display_name":"Livestock Farming and Management","score":0.0658000037074089,"subfield":{"id":"https://openalex.org/subfields/1102","display_name":"Agronomy and Crop Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8116999864578247},{"id":"https://openalex.org/keywords/physical-access","display_name":"Physical access","score":0.7297000288963318},{"id":"https://openalex.org/keywords/network-access-device","display_name":"Network Access Device","score":0.7164999842643738},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.6876999735832214},{"id":"https://openalex.org/keywords/access-network","display_name":"Access network","score":0.6055999994277954},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.5666999816894531},{"id":"https://openalex.org/keywords/discretionary-access-control","display_name":"Discretionary access control","score":0.535099983215332},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.49239999055862427},{"id":"https://openalex.org/keywords/access-network-discovery-and-selection-function","display_name":"Access network discovery and selection function","score":0.4708000123500824}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8116999864578247},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.7297000288963318},{"id":"https://openalex.org/C184533269","wikidata":"https://www.wikidata.org/wiki/Q16977811","display_name":"Network Access Device","level":4,"score":0.7164999842643738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.698199987411499},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.6876999735832214},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6510999798774719},{"id":"https://openalex.org/C62793504","wikidata":"https://www.wikidata.org/wiki/Q228327","display_name":"Access network","level":2,"score":0.6055999994277954},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.5666999816894531},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.535099983215332},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.49239999055862427},{"id":"https://openalex.org/C38639735","wikidata":"https://www.wikidata.org/wiki/Q4672466","display_name":"Access network discovery and selection function","level":5,"score":0.4708000123500824},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4629000127315521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4032999873161316},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.38690000772476196},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.34610000252723694},{"id":"https://openalex.org/C513196756","wikidata":"https://www.wikidata.org/wiki/Q3295108","display_name":"Media access control","level":3,"score":0.3206999897956848},{"id":"https://openalex.org/C2778022998","wikidata":"https://www.wikidata.org/wiki/Q651136","display_name":"Transit (satellite)","level":3,"score":0.29750001430511475},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.2935999929904938},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.29170000553131104},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C2983646967","wikidata":"https://www.wikidata.org/wiki/Q688498","display_name":"Access technology","level":3,"score":0.27970001101493835},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C2776543384","wikidata":"https://www.wikidata.org/wiki/Q593289","display_name":"Information access","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C2777481183","wikidata":"https://www.wikidata.org/wiki/Q6770787","display_name":"Market access","level":3,"score":0.2743000090122223},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2590999901294708}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11161387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1484158612","https://openalex.org/W1596770903","https://openalex.org/W2006435204","https://openalex.org/W2014660968","https://openalex.org/W2058347046","https://openalex.org/W2087834864","https://openalex.org/W2160612883","https://openalex.org/W2166602595","https://openalex.org/W2526944313","https://openalex.org/W2800397646","https://openalex.org/W2907549405","https://openalex.org/W2983253154","https://openalex.org/W2991894997","https://openalex.org/W3110256582","https://openalex.org/W3130002881","https://openalex.org/W4230963982","https://openalex.org/W4256352503","https://openalex.org/W4282578031","https://openalex.org/W4285212123","https://openalex.org/W4312251146"],"related_works":[],"abstract_inverted_index":{"Access":[0],"control":[1,25,72,77,100],"systems":[2],"typically":[3],"evaluate":[4],"the":[5,37,70],"security":[6],"aspects":[7],"of":[8,36],"communication":[9],"endpoints":[10],"to":[11,96],"determine":[12],"access":[13,24,53,59,71,76,99],"permission,":[14],"but":[15],"they":[16],"often":[17],"overlook":[18],"network-level":[19,80],"threats.":[20],"We":[21],"argue":[22],"that":[23,89],"decisions":[26,60],"for":[27],"remote":[28],"entities":[29],"should":[30],"be":[31],"made":[32],"with":[33],"explicit":[34],"consideration":[35],"transit":[38,63],"network":[39,64,68],"environment.":[40],"In":[41],"this":[42],"study,":[43],"we":[44],"propose":[45],"a":[46],"novel":[47],"concept":[48],"called":[49],"PAAC,":[50],"path-aware":[51],"attribute-based":[52,98],"control,":[54],"which":[55],"extends":[56],"existing":[57,97],"endpoint-oriented":[58],"by":[61],"considering":[62],"information.":[65],"By":[66],"incorporating":[67],"metrics,":[69],"system":[73],"enables":[74],"finer-grained":[75],"and":[78,94],"mitigates":[79],"threats":[81],"such":[82],"as":[83],"BGP":[84],"hijacking.":[85],"Our":[86],"experiments":[87],"demonstrate":[88],"PAAC":[90],"achieves":[91],"comparable":[92],"performance":[93],"scalability":[95],"approaches.":[101]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
