{"id":"https://openalex.org/W2995338597","doi":"https://doi.org/10.1142/s0218843020400018","title":"A Graph and Clustering-Based Framework for Efficient XACML Policy Evaluation","display_name":"A Graph and Clustering-Based Framework for Efficient XACML Policy Evaluation","publication_year":2019,"publication_date":"2019-12-10","ids":{"openalex":"https://openalex.org/W2995338597","doi":"https://doi.org/10.1142/s0218843020400018","mag":"2995338597"},"language":"en","primary_location":{"id":"doi:10.1142/s0218843020400018","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218843020400018","pdf_url":null,"source":{"id":"https://openalex.org/S17147961","display_name":"International Journal of Cooperative Information Systems","issn_l":"0218-8430","issn":["0218-8430","1793-6365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cooperative Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101802976","display_name":"Yanfei Li","orcid":"https://orcid.org/0000-0003-3275-0925"},"institutions":[{"id":"https://openalex.org/I4210117164","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210117164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanfei Li","raw_affiliation_strings":["School of Information Technology, Luoyang Normal University, Luoyang 471934, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Luoyang Normal University, Luoyang 471934, P. R. China","institution_ids":["https://openalex.org/I4210117164"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101926925","display_name":"Fan Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I110440473","display_name":"Xi'an University of Science and Technology","ror":"https://ror.org/046fkpt18","country_code":"CN","type":"education","lineage":["https://openalex.org/I110440473"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Deng","raw_affiliation_strings":["Institute of Systems Security and Control, School of Computer Science and Technology, Xi\u2019an University of Science and Technology, Xi\u2019an 710054, P. R. China","Institute of Systems Security and Control, School of Computer Science and Technology, Xi'an University of Science and Technology, Xi'an 710054, P. R. China"],"affiliations":[{"raw_affiliation_string":"Institute of Systems Security and Control, School of Computer Science and Technology, Xi\u2019an University of Science and Technology, Xi\u2019an 710054, P. R. China","institution_ids":["https://openalex.org/I110440473"]},{"raw_affiliation_string":"Institute of Systems Security and Control, School of Computer Science and Technology, Xi'an University of Science and Technology, Xi'an 710054, P. R. China","institution_ids":["https://openalex.org/I110440473"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101926925"],"corresponding_institution_ids":["https://openalex.org/I110440473"],"apc_list":null,"apc_paid":null,"fwci":0.51,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79519769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"29","issue":"01n02","first_page":"2040001","last_page":"2040001"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.9682269096374512},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.865634024143219},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.5258931517601013},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5254817605018616},{"id":"https://openalex.org/keywords/markup-language","display_name":"Markup language","score":0.5041486024856567},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.49048396944999695},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.45291730761528015},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.44319605827331543},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3220010995864868},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.26763632893562317},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17528235912322998},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11025279760360718},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10773906111717224}],"concepts":[{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.9682269096374512},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.865634024143219},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.5258931517601013},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5254817605018616},{"id":"https://openalex.org/C45874996","wikidata":"https://www.wikidata.org/wiki/Q37045","display_name":"Markup language","level":3,"score":0.5041486024856567},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.49048396944999695},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.45291730761528015},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.44319605827331543},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3220010995864868},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.26763632893562317},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17528235912322998},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11025279760360718},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10773906111717224},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218843020400018","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218843020400018","pdf_url":null,"source":{"id":"https://openalex.org/S17147961","display_name":"International Journal of Cooperative Information Systems","issn_l":"0218-8430","issn":["0218-8430","1793-6365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cooperative Information Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1603812508","display_name":null,"funder_award_id":"61702408","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1563423869","https://openalex.org/W1974489177","https://openalex.org/W1981546908","https://openalex.org/W1992277492","https://openalex.org/W2003986286","https://openalex.org/W2015910124","https://openalex.org/W2022975607","https://openalex.org/W2048993855","https://openalex.org/W2053851330","https://openalex.org/W2077475078","https://openalex.org/W2110355418","https://openalex.org/W2113390504","https://openalex.org/W2116249553","https://openalex.org/W2124183148","https://openalex.org/W2127019151","https://openalex.org/W2144899667","https://openalex.org/W2151315194","https://openalex.org/W2559770308","https://openalex.org/W2567596697","https://openalex.org/W2804755743","https://openalex.org/W2896936148","https://openalex.org/W2923904518"],"related_works":["https://openalex.org/W2298494124","https://openalex.org/W2125405387","https://openalex.org/W2351416088","https://openalex.org/W2198182223","https://openalex.org/W2349247816","https://openalex.org/W1520745363","https://openalex.org/W1552878720","https://openalex.org/W130718849","https://openalex.org/W1993102289","https://openalex.org/W3144583911"],"abstract_inverted_index":{"EXtensible":[0],"Access":[1],"Control":[2],"Markup":[3],"Language":[4],"(XACML)":[5],"is":[6,115,175,206],"one":[7],"of":[8,121,166,177,215],"the":[9,20,26,30,42,46,62,68,74,79,85,90,96,100,105,112,119,143,148,155,160,164,181,190,197,212,216],"standardized":[10],"languages":[11],"for":[12,89],"specifying":[13],"access":[14,39],"control":[15],"policies.":[16],"Policies":[17],"described":[18],"by":[19,222],"XACML":[21],"are":[22,135],"used":[23],"to":[24,44,118,146],"express":[25],"security":[27],"requirement":[28],"in":[29,104,186],"network":[31],"and":[32,58,99,158,193,196,204],"information":[33],"system":[34],"when":[35],"we":[36,53,66,77,93,141,153],"study":[37],"authorization":[38],"control.":[40],"With":[41],"aim":[43],"improve":[45],"Policy":[47],"Decision":[48],"Point":[49],"(PDP)":[50],"evaluation":[51,187,213],"performance,":[52],"put":[54],"forward":[55],"a":[56],"Graph":[57],"Clustering-Based":[59],"Framework,":[60],"employing":[61],"aggregate":[63,86],"function.":[64,87],"First,":[65],"partition":[67,81,120],"rule":[69,122],"set":[70,114],"into":[71,137],"subsets.":[72],"For":[73],"single":[75,109,129],"value,":[76,92],"select":[78],"best":[80],"quantity":[82],"based":[83],"on":[84,163],"As":[88],"interval":[91,133],"handle":[94],"with":[95],"start":[97],"point":[98],"finish":[101],"point,":[102],"respectively,":[103],"same":[106],"way":[107],"as":[108,200,202],"value.":[110],"Second,":[111],"policy":[113,161],"split":[116],"according":[117],"set.":[123],"In":[124],"this":[125],"way,":[126],"not":[127],"only":[128],"values,":[130],"but":[131],"also":[132],"values":[134],"taken":[136],"consideration.":[138],"After":[139],"that,":[140],"explore":[142],"searching":[144],"tree":[145,157],"obtain":[147],"possibly":[149],"matched":[150],"rules.":[151],"Finally,":[152],"construct":[154],"combining":[156],"output":[159],"decision":[162],"basis":[165],"it.":[167],"The":[168],"experimental":[169],"results":[170,209],"show":[171,210],"that":[172,211],"our":[173],"approach":[174],"orders":[176],"magnitude":[178],"better":[179],"than":[180],"Sun":[182,198],"PDP.":[183],"A":[184],"comparison":[185],"performance":[188,214],"between":[189],"redundancy":[191],"detecting":[192],"eliminating":[194,223],"engine":[195],"PDP,":[199],"well":[201],"XEngine":[203],"SBA-XACML,":[205],"made.":[207],"Experimental":[208],"PDP":[217],"can":[218],"be":[219],"prominently":[220],"improved":[221],"redundancies.":[224]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
