{"id":"https://openalex.org/W4381734250","doi":"https://doi.org/10.1109/wf-iot54382.2022.10152041","title":"An Evolutionary Risk-based Access Control Framework for Enterprise File Systems","display_name":"An Evolutionary Risk-based Access Control Framework for Enterprise File Systems","publication_year":2022,"publication_date":"2022-10-26","ids":{"openalex":"https://openalex.org/W4381734250","doi":"https://doi.org/10.1109/wf-iot54382.2022.10152041"},"language":"en","primary_location":{"id":"doi:10.1109/wf-iot54382.2022.10152041","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wf-iot54382.2022.10152041","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031678671","display_name":"Shi-Cho Cha","orcid":"https://orcid.org/0000-0002-2739-9512"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shi-Cho Cha","raw_affiliation_strings":["National Taiwan University of Science and Technology,Dept. of Information Management,Taipei,R.O.C","Dept. of Information Management, National Taiwan University of Science and Technology, Taipei, R.O.C"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology,Dept. of Information Management,Taipei,R.O.C","institution_ids":[]},{"raw_affiliation_string":"Dept. of Information Management, National Taiwan University of Science and Technology, Taipei, R.O.C","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092241892","display_name":"Yi-Hsuan Hsuan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi-Hsuan Hsuan","raw_affiliation_strings":["National Taiwan University of Science and Technology,Dept. of Information Management,Taipei,R.O.C","Dept. of Information Management, National Taiwan University of Science and Technology, Taipei, R.O.C"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology,Dept. of Information Management,Taipei,R.O.C","institution_ids":[]},{"raw_affiliation_string":"Dept. of Information Management, National Taiwan University of Science and Technology, Taipei, R.O.C","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043276911","display_name":"Kuo\u2010Hui Yeh","orcid":"https://orcid.org/0000-0003-0598-761X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kuo-Hui Yeh","raw_affiliation_strings":["National Dong Hwa University, Hualien, R.O.C.,Dept. of Information Management,Taipei,R.O.C","Dept. of Information Management, National Dong Hwa University, Hualien, R.O.C., Taipei, R.O.C"],"affiliations":[{"raw_affiliation_string":"National Dong Hwa University, Hualien, R.O.C.,Dept. of Information Management,Taipei,R.O.C","institution_ids":[]},{"raw_affiliation_string":"Dept. of Information Management, National Dong Hwa University, Hualien, R.O.C., Taipei, R.O.C","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101871110","display_name":"Takeshi Ishihara","orcid":"https://orcid.org/0000-0003-3672-4804"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Takeshi Ishihara","raw_affiliation_strings":["Kioxia Corporation,Kanagawa,Japan","Kioxia Corporation, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"Kioxia Corporation,Kanagawa,Japan","institution_ids":[]},{"raw_affiliation_string":"Kioxia Corporation, Kanagawa, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065616148","display_name":"Yoshihiro Ohba","orcid":"https://orcid.org/0000-0003-4775-9244"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ohba Yoshihiro","raw_affiliation_strings":["Kioxia Corporation,Kanagawa,Japan","Kioxia Corporation, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"Kioxia Corporation,Kanagawa,Japan","institution_ids":[]},{"raw_affiliation_string":"Kioxia Corporation, Kanagawa, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112943800","display_name":"Wei-Nin Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wei-Nin Chen","raw_affiliation_strings":["National Taiwan University of Science and Technology,Department of Information Management,Taipei,R.O.C","Department of Information Management, National Taiwan University of Science and Technology, Taipei, R.O.C"],"affiliations":[{"raw_affiliation_string":"National Taiwan University of Science and Technology,Department of Information Management,Taipei,R.O.C","institution_ids":[]},{"raw_affiliation_string":"Department of Information Management, National Taiwan University of Science and Technology, Taipei, R.O.C","institution_ids":["https://openalex.org/I154864474"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5031678671"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.379,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74863642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8542923331260681},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.675253689289093},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.66230309009552},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.6037123203277588},{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.46406492590904236},{"id":"https://openalex.org/keywords/discretionary-access-control","display_name":"Discretionary access control","score":0.45257091522216797},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.43434858322143555},{"id":"https://openalex.org/keywords/physical-access","display_name":"Physical access","score":0.43237560987472534},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4124557375907898},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32083335518836975},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3134973645210266},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1652814745903015}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8542923331260681},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.675253689289093},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.66230309009552},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.6037123203277588},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.46406492590904236},{"id":"https://openalex.org/C48814466","wikidata":"https://www.wikidata.org/wiki/Q1228590","display_name":"Discretionary access control","level":4,"score":0.45257091522216797},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.43434858322143555},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.43237560987472534},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4124557375907898},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32083335518836975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3134973645210266},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1652814745903015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wf-iot54382.2022.10152041","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/wf-iot54382.2022.10152041","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W27149491","https://openalex.org/W122128629","https://openalex.org/W2033344846","https://openalex.org/W2936201262","https://openalex.org/W3035173296","https://openalex.org/W3177301840","https://openalex.org/W4252307542","https://openalex.org/W6605003785","https://openalex.org/W6767886546"],"related_works":["https://openalex.org/W2770657926","https://openalex.org/W3023964565","https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W1596015467","https://openalex.org/W2054600748","https://openalex.org/W2358662376","https://openalex.org/W2535097329","https://openalex.org/W2183827907","https://openalex.org/W2362979444"],"abstract_inverted_index":{"To":[0,197],"enhance":[1],"access":[2,9,32,85,92,98,102,111,118,146,150,178,194,209],"control":[3,86,93,103,112,119,147,151,179,195,210],"mechanisms,":[4],"organizations":[5,15,127,164,175,189],"need":[6],"to":[7,29,82,128,141,170,190,244,248],"monitor":[8],"requests":[10,28,99],"issued":[11],"from":[12],"devices.":[13],"There-fore,":[14],"can":[16,95,107,153,176,213,241],"evaluate":[17],"the":[18,23,31,123,159,174,185,198,203,207,226,230],"trustworthiness":[19],"or":[20],"risks":[21],"of":[22,55,200],"devices":[24],"based":[25,100,157],"on":[26,101,158],"collected":[27],"adapt":[30,154],"privileges.":[33],"However,":[34],"existing":[35,117],"schemes":[36],"usually":[37],"do":[38,165],"not":[39,46,166],"address":[40],"organizational":[41,216],"authorization":[42],"processes":[43],"and":[44,139],"may":[45],"be":[47,142],"suitable":[48],"for":[49,68,79,88,133],"enterprise":[50,69],"file":[51,70],"systems.":[52,71],"In":[53,121],"light":[54],"this,":[56],"this":[57,239],"study":[58,222,240],"proposes":[59],"an":[60,76,80,246],"Evolutionary":[61],"Risk":[62],"Adaptive":[63],"Access":[64],"Control":[65],"(ERAAC)":[66],"Framework":[67],"The":[72,149],"proposed":[73,124,186,204,227],"framework":[74,125,187,205,211,228],"provides":[75],"extensible":[77],"architecture":[78],"organization":[81,106,247],"deploy":[83],"different":[84,89],"filters":[87],"perspectives.":[90],"An":[91,105],"filter":[94,96,113],"out":[97],"policies.":[104,148],"add":[108],"a":[109],"new":[110,130],"without":[114,181],"replacing":[115],"its":[116],"mechanism.":[120],"addition,":[122],"enables":[126,188],"define":[129],"risk":[131,160,172,182,219],"labels":[132],"data":[134,169],"entities,":[135],"such":[136],"as":[137],"subjects":[138],"objects":[140],"accessed,":[143],"used":[144],"in":[145,218,234],"mechanism":[152],"user":[155],"privileges":[156],"labels.":[161,183],"Even":[162],"if":[163],"have":[167],"enough":[168],"generate":[171],"labels,":[173],"set":[177],"policies":[180],"Therefore,":[184],"progressively":[191],"improve":[192],"their":[193],"mechanisms.":[196],"best":[199],"our":[201],"knowledge,":[202],"is":[206],"first":[208],"that":[212],"evolve":[214],"with":[215],"maturity":[217],"management.":[220],"This":[221],"also":[223],"illustrates":[224],"how":[225],"satisfied":[229],"related":[231],"tenets":[232],"mentioned":[233],"NIST":[235],"SP":[236],"800\u2013207.":[237],"Consequently,":[238],"hopefully":[242],"contribute":[243],"helping":[245],"implement":[249],"zero":[250],"trust":[251],"architecture.":[252]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
