{"id":"https://openalex.org/W4378364119","doi":"https://doi.org/10.1109/isdfs58141.2023.10131711","title":"Deep Learning-Based Attribute Optimization Method for ABAC","display_name":"Deep Learning-Based Attribute Optimization Method for ABAC","publication_year":2023,"publication_date":"2023-05-11","ids":{"openalex":"https://openalex.org/W4378364119","doi":"https://doi.org/10.1109/isdfs58141.2023.10131711"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs58141.2023.10131711","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs58141.2023.10131711","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101957538","display_name":"Wei Yuan","orcid":"https://orcid.org/0000-0002-5867-5364"},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Wei","raw_affiliation_strings":["Shanghai University of Electric Power,School of Computer Science &amp; Technology,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Electric Power,School of Computer Science &amp; Technology,Shanghai,China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"last","author":{"id":null,"display_name":"Tian Xiuxia","orcid":null},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Xiuxia","raw_affiliation_strings":["Shanghai University of Electric Power,School of Computer Science &amp; Technology,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Electric Power,School of Computer Science &amp; Technology,Shanghai,China","institution_ids":["https://openalex.org/I23632641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101957538"],"corresponding_institution_ids":["https://openalex.org/I23632641"],"apc_list":null,"apc_paid":null,"fwci":0.5681,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72626604,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"30","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.879524827003479},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6498566269874573},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6244596838951111},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6173661947250366},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.566148042678833},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5540286898612976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5190523266792297},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4757884740829468},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.45557916164398193},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4252825975418091},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4169521927833557},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4092922806739807},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.40077340602874756},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36934196949005127},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15906134247779846},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.08202078938484192}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.879524827003479},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6498566269874573},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6244596838951111},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6173661947250366},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.566148042678833},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5540286898612976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5190523266792297},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4757884740829468},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.45557916164398193},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4252825975418091},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4169521927833557},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4092922806739807},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.40077340602874756},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36934196949005127},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15906134247779846},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.08202078938484192},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs58141.2023.10131711","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isdfs58141.2023.10131711","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"No poverty","score":0.550000011920929,"id":"https://metadata.un.org/sdg/1"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2028722148","https://openalex.org/W2111111494","https://openalex.org/W2150656895","https://openalex.org/W2384897939","https://openalex.org/W2536413803","https://openalex.org/W2688811510","https://openalex.org/W2806152525","https://openalex.org/W2817857516","https://openalex.org/W2907892634","https://openalex.org/W2938830017","https://openalex.org/W2951365233","https://openalex.org/W3153196891","https://openalex.org/W6761910064"],"related_works":["https://openalex.org/W2373984226","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2361337511","https://openalex.org/W2358774039","https://openalex.org/W1513229083","https://openalex.org/W2353815999","https://openalex.org/W4390864104","https://openalex.org/W2374393728","https://openalex.org/W2124367090"],"abstract_inverted_index":{"Access":[0],"control":[1,93],"is":[2,13,50,69,81],"essential":[3],"for":[4],"ensuring":[5],"data":[6],"security.":[7],"However,":[8],"attribute-based":[9],"access":[10,57,92],"control(ABAC)":[11],"performance":[12],"hindered":[14],"by":[15],"issues":[16],"such":[17],"as":[18],"an":[19],"excessive":[20],"number":[21],"of":[22,112],"attributes,":[23],"poor":[24],"quality,":[25],"and":[26,78],"insufficient":[27],"semantic":[28,79],"information.":[29],"To":[30],"address":[31],"these":[32],"issues,":[33],"this":[34],"paper":[35],"proposes":[36],"a":[37,45,74],"deep":[38,46],"learning-based":[39],"ABAC":[40],"attribute":[41,96],"optimization":[42,115],"method.":[43,116],"Specifically,":[44],"neural":[47,66],"network":[48,67],"ERNIE-RCNN":[49],"proposed":[51,114],"to":[52,72,83,105,108],"extract":[53],"effective":[54],"words":[55],"containing":[56],"permission":[58],"information":[59],"from":[60],"upper-level":[61],"policy":[62],"documents.":[63],"A":[64],"convolutional":[65],"(CNN)":[68],"then":[70],"used":[71,82,104],"train":[73],"word":[75],"embedding":[76],"model,":[77],"similarity":[80],"eliminate":[84],"ineffective":[85],"attributes":[86],"that":[87],"are":[88,103],"lowly":[89],"correlated":[90],"with":[91],"while":[94],"optimizing":[95],"values.":[97],"Finally,":[98],"multiple":[99],"strategy":[100],"generation":[101],"algorithms":[102],"conduct":[106],"experiments":[107],"verify":[109],"the":[110,113],"effectiveness":[111]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
