{"id":"https://openalex.org/W4416962089","doi":"https://doi.org/10.1109/pst65910.2025.11268829","title":"Securing Multi-Domain Systems: Intelligent ABAC Policy Learning for Cross-Domain Access Control","display_name":"Securing Multi-Domain Systems: Intelligent ABAC Policy Learning for Cross-Domain Access Control","publication_year":2025,"publication_date":"2025-08-26","ids":{"openalex":"https://openalex.org/W4416962089","doi":"https://doi.org/10.1109/pst65910.2025.11268829"},"language":null,"primary_location":{"id":"doi:10.1109/pst65910.2025.11268829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst65910.2025.11268829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073205983","display_name":"Asmita Biswas","orcid":"https://orcid.org/0000-0002-1274-9487"},"institutions":[{"id":"https://openalex.org/I4210101034","display_name":"Birla Institute of Technology and Science - Hyderabad Campus","ror":"https://ror.org/014ctt859","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101034","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Asmita Biswas","raw_affiliation_strings":["Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Pilani, Hyderabad Campus, Jawahar Nagar, Kapra Mandal, Medchal District,Telangana,India,500078"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Pilani, Hyderabad Campus, Jawahar Nagar, Kapra Mandal, Medchal District,Telangana,India,500078","institution_ids":["https://openalex.org/I4210101034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038335735","display_name":"Barsha Mitra","orcid":"https://orcid.org/0000-0003-0688-5383"},"institutions":[{"id":"https://openalex.org/I4210101034","display_name":"Birla Institute of Technology and Science - Hyderabad Campus","ror":"https://ror.org/014ctt859","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101034","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Barsha Mitra","raw_affiliation_strings":["Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Pilani, Hyderabad Campus, Jawahar Nagar, Kapra Mandal, Medchal District,Telangana,India,500078"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Pilani, Hyderabad Campus, Jawahar Nagar, Kapra Mandal, Medchal District,Telangana,India,500078","institution_ids":["https://openalex.org/I4210101034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003563704","display_name":"Iqbal Gondal","orcid":"https://orcid.org/0000-0001-7963-2446"},"institutions":[{"id":"https://openalex.org/I1320473756","display_name":"The Royal Melbourne Hospital","ror":"https://ror.org/005bvs909","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1320473756","https://openalex.org/I4210158168"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Iqbal Gondal","raw_affiliation_strings":["Royal Melbourne Institute of Technology,School of Computing Technologies,Melbourne,VIC,Australia,3000"],"affiliations":[{"raw_affiliation_string":"Royal Melbourne Institute of Technology,School of Computing Technologies,Melbourne,VIC,Australia,3000","institution_ids":["https://openalex.org/I1320473756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101414783","display_name":"Qiang Fu","orcid":"https://orcid.org/0000-0001-7237-9361"},"institutions":[{"id":"https://openalex.org/I1320473756","display_name":"The Royal Melbourne Hospital","ror":"https://ror.org/005bvs909","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1320473756","https://openalex.org/I4210158168"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Qiang Fu","raw_affiliation_strings":["Royal Melbourne Institute of Technology,School of Computing Technologies,Melbourne,VIC,Australia,3000"],"affiliations":[{"raw_affiliation_string":"Royal Melbourne Institute of Technology,School of Computing Technologies,Melbourne,VIC,Australia,3000","institution_ids":["https://openalex.org/I1320473756"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073205983"],"corresponding_institution_ids":["https://openalex.org/I4210101034"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.48743157,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.014399999752640724,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8592000007629395},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6037999987602234},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.585099995136261},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.5444999933242798},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5097000002861023},{"id":"https://openalex.org/keywords/physical-access","display_name":"Physical access","score":0.47780001163482666},{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.4426000118255615},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41769999265670776},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.40470001101493835}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8592000007629395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7731999754905701},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6037999987602234},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.585099995136261},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.5444999933242798},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5097000002861023},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.47780001163482666},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.4426000118255615},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41769999265670776},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.40470001101493835},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.388700008392334},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3603000044822693},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.35339999198913574},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.3474000096321106},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.3400000035762787},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3384999930858612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3366999924182892},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3043999969959259},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.30070000886917114},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.29100000858306885},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28029999136924744},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27730000019073486},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2721000015735626},{"id":"https://openalex.org/C205875254","wikidata":"https://www.wikidata.org/wiki/Q17156857","display_name":"Decentralised system","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.2590999901294708}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst65910.2025.11268829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst65910.2025.11268829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1037096493","https://openalex.org/W1594706025","https://openalex.org/W2022985851","https://openalex.org/W2197800877","https://openalex.org/W2298912813","https://openalex.org/W2598848726","https://openalex.org/W2732663000","https://openalex.org/W2774959022","https://openalex.org/W2790799378","https://openalex.org/W2806152525","https://openalex.org/W2913369986","https://openalex.org/W2962744771","https://openalex.org/W2999850375","https://openalex.org/W3130969560","https://openalex.org/W3213600441","https://openalex.org/W4226189137","https://openalex.org/W4230963982","https://openalex.org/W4255084977","https://openalex.org/W4352982521","https://openalex.org/W4360798308","https://openalex.org/W4377984748","https://openalex.org/W4383426691","https://openalex.org/W4384662737","https://openalex.org/W4385154318","https://openalex.org/W4389060420","https://openalex.org/W4390640248"],"related_works":[],"abstract_inverted_index":{"Ensuring":[0],"secure,":[1],"dynamic,":[2],"and":[3,44,161,205,213],"fine-grained":[4],"access":[5,20,83,114,135,152,190,215],"control":[6,21,153,216],"across":[7,201],"independently":[8],"managed":[9],"domains":[10,125],"is":[11,103],"a":[12,38,41,61,94,107],"major":[13],"challenge":[14],"in":[15,155,184,217],"modern":[16],"multi-domain":[17,25,66,219],"environments.":[18,220],"An":[19],"mechanism":[22],"designed":[23],"for":[24,30,53,65],"systems":[26],"needs":[27],"to":[28,81,126,133],"account":[29],"the":[31,69,89,100,113,123,145,181,187],"unique":[32],"characteristics":[33],"of":[34,116,147,157,186,189],"such":[35],"systems,":[36],"like":[37],"distributed":[39],"environment,":[40],"dynamic":[42],"nature,":[43],"cross-domain":[45],"collaboration.":[46],"This":[47,192],"paper":[48],"proposes":[49],"an":[50,170],"intelligent":[51],"framework":[52,197],"mining":[54,174],"Attribute-Based":[55],"Access":[56],"Control":[57],"(ABAC)":[58],"policies":[59],"using":[60,112],"supervised":[62,108],"learning":[63,110],"technique":[64],"systems.":[67],"In":[68],"proposed":[70,120,177,196],"architecture,":[71],"each":[72,98],"domain":[73,91],"employs":[74],"its":[75],"own":[76,140],"Policy":[77],"Decision":[78],"Engine":[79],"(PDE)":[80],"evaluate":[82,144],"requests":[84],"originating":[85],"either":[86],"from":[87,93],"within":[88],"same":[90],"or":[92],"remote":[95],"domain.":[96,118],"For":[97],"domain,":[99],"ABAC":[101,207],"policy":[102,173,208],"derived":[104],"by":[105,130],"training":[106],"machine":[109],"model":[111],"logs":[115],"that":[117,194],"Our":[119,176],"method":[121,168,178],"enables":[122],"different":[124],"retain":[127],"their":[128,139],"autonomy":[129],"allowing":[131],"them":[132],"make":[134],"decisions":[136],"based":[137],"on":[138,150],"independent":[141],"policies.":[142],"We":[143],"performance":[146],"our":[148,167,195],"approach":[149,183],"two":[151],"datasets":[154],"terms":[156,185],"accuracy,":[158],"precision,":[159],"recall,":[160],"F1":[162],"score.":[163],"Moreover,":[164],"we":[165],"compare":[166],"with":[169],"existing":[171,182],"clustering-based":[172],"technique.":[175],"significantly":[179],"outperforms":[180],"accuracy":[188],"decision-making.":[191],"implies":[193],"exhibits":[198],"strong":[199],"generalization":[200],"domains,":[202],"supporting":[203],"scalable":[204],"decentralized":[206],"learning,":[209],"thereby":[210],"enabling":[211],"secure":[212],"interoperable":[214],"complex,":[218]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-03T00:00:00"}
