{"id":"https://openalex.org/W2019272477","doi":"https://doi.org/10.1145/2133601.2133623","title":"Quantitative access control with partially-observable Markov decision processes","display_name":"Quantitative access control with partially-observable Markov decision processes","publication_year":2012,"publication_date":"2012-02-07","ids":{"openalex":"https://openalex.org/W2019272477","doi":"https://doi.org/10.1145/2133601.2133623","mag":"2019272477"},"language":"en","primary_location":{"id":"doi:10.1145/2133601.2133623","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2133601.2133623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101546784","display_name":"Fabio Martinelli","orcid":"https://orcid.org/0000-0002-6721-9395"},"institutions":[{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Fabio Martinelli","raw_affiliation_strings":["IIT-CNR, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"IIT-CNR, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018274720","display_name":"C. Morisset","orcid":"https://orcid.org/0000-0001-5801-6724"},"institutions":[{"id":"https://openalex.org/I4210130157","display_name":"Institute of Informatics and Telematics","ror":"https://ror.org/02gdcn153","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210130157","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Charles Morisset","raw_affiliation_strings":["IIT-CNR, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"IIT-CNR, Pisa, Italy","institution_ids":["https://openalex.org/I4210130157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101546784"],"corresponding_institution_ids":["https://openalex.org/I4210130157"],"apc_list":null,"apc_paid":null,"fwci":14.61517851,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.98569404,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"169","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/partially-observable-markov-decision-process","display_name":"Partially observable Markov decision process","score":0.7614556550979614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7508188486099243},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.7412084937095642},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6903340816497803},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6685341596603394},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6421678066253662},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5422995090484619},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.5112695693969727},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4957450330257416},{"id":"https://openalex.org/keywords/decision-theory","display_name":"Decision theory","score":0.4938982129096985},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4738239049911499},{"id":"https://openalex.org/keywords/decision-problem","display_name":"Decision problem","score":0.44624608755111694},{"id":"https://openalex.org/keywords/decision-process","display_name":"Decision process","score":0.440903902053833},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4315037131309509},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4215846061706543},{"id":"https://openalex.org/keywords/observable","display_name":"Observable","score":0.4188334047794342},{"id":"https://openalex.org/keywords/markov-model","display_name":"Markov model","score":0.36778461933135986},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23464515805244446},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.23381364345550537},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.1698969006538391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15571483969688416},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10890746116638184},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10644930601119995},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07751885056495667}],"concepts":[{"id":"https://openalex.org/C17098449","wikidata":"https://www.wikidata.org/wiki/Q176814","display_name":"Partially observable Markov decision process","level":4,"score":0.7614556550979614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7508188486099243},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.7412084937095642},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6903340816497803},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6685341596603394},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6421678066253662},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5422995090484619},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.5112695693969727},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4957450330257416},{"id":"https://openalex.org/C28901747","wikidata":"https://www.wikidata.org/wiki/Q177571","display_name":"Decision theory","level":2,"score":0.4938982129096985},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4738239049911499},{"id":"https://openalex.org/C115988155","wikidata":"https://www.wikidata.org/wiki/Q3262192","display_name":"Decision problem","level":2,"score":0.44624608755111694},{"id":"https://openalex.org/C2984634286","wikidata":"https://www.wikidata.org/wiki/Q1331926","display_name":"Decision process","level":2,"score":0.440903902053833},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4315037131309509},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4215846061706543},{"id":"https://openalex.org/C32848918","wikidata":"https://www.wikidata.org/wiki/Q845789","display_name":"Observable","level":2,"score":0.4188334047794342},{"id":"https://openalex.org/C163836022","wikidata":"https://www.wikidata.org/wiki/Q6771326","display_name":"Markov model","level":3,"score":0.36778461933135986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23464515805244446},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.23381364345550537},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.1698969006538391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15571483969688416},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10890746116638184},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10644930601119995},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07751885056495667},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2133601.2133623","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2133601.2133623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338370","display_name":"FP7 Information and Communication Technologies","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W12937786","https://openalex.org/W27149491","https://openalex.org/W182234909","https://openalex.org/W1511817737","https://openalex.org/W1524995262","https://openalex.org/W1538075516","https://openalex.org/W1558615742","https://openalex.org/W1563965851","https://openalex.org/W1669748495","https://openalex.org/W1965028510","https://openalex.org/W1981023347","https://openalex.org/W1985451433","https://openalex.org/W1997888312","https://openalex.org/W2009995732","https://openalex.org/W2019102308","https://openalex.org/W2032100464","https://openalex.org/W2034725503","https://openalex.org/W2046386513","https://openalex.org/W2052391512","https://openalex.org/W2057028717","https://openalex.org/W2058347046","https://openalex.org/W2076337359","https://openalex.org/W2098457658","https://openalex.org/W2099873296","https://openalex.org/W2110962519","https://openalex.org/W2120138410","https://openalex.org/W2124697609","https://openalex.org/W2124936107","https://openalex.org/W2131088501","https://openalex.org/W2134802714","https://openalex.org/W2145028214","https://openalex.org/W2152706713","https://openalex.org/W2160091048","https://openalex.org/W2171022360","https://openalex.org/W2295605012","https://openalex.org/W2561675875","https://openalex.org/W2602600070","https://openalex.org/W3101822862","https://openalex.org/W6679977494","https://openalex.org/W6736105761","https://openalex.org/W6808419535"],"related_works":["https://openalex.org/W2096013579","https://openalex.org/W52153049","https://openalex.org/W1760611253","https://openalex.org/W1589140671","https://openalex.org/W1515117609","https://openalex.org/W4323315247","https://openalex.org/W2294884454","https://openalex.org/W3169161914","https://openalex.org/W4321379664","https://openalex.org/W2123673598"],"abstract_inverted_index":{"This":[0,150],"paper":[1],"presents":[2],"a":[3,14,20,38,63,81,101,113,132],"novel":[4],"access":[5,10,90],"control":[6,11,91],"framework":[7,111],"reducing":[8],"the":[9,29,41,50,56,59,66,69,73,147],"problem":[12],"to":[13,23,35,76,140],"traditional":[15,51],"decision":[16,30],"problem,":[17],"thus":[18],"allowing":[19],"policy":[21,144],"designer":[22],"reuse":[24],"tools":[25],"and":[26,75,107,124,127],"techniques":[27],"from":[28,146],"theory.":[31],"We":[32,86],"propose":[33],"here":[34],"express,":[36],"within":[37],"single":[39],"framework,":[40],"notion":[42],"of":[43,45,53,61,72,84,119,135,160],"utility":[44],"an":[46,54,89,142],"access,":[47,55],"decisions":[48],"beyond":[49],"allowing/denying":[52],"uncertainty":[57,67],"over":[58,68],"effect":[60],"executing":[62],"given":[64,133],"decision,":[65],"current":[70],"state":[71],"system,":[74],"optimize":[77],"this":[78,110],"process":[79],"for":[80,131,156],"(probabilistic)":[82],"sequence":[83,134],"requests.":[85,161],"show":[87,129],"that":[88,130],"mechanism":[92],"including":[93],"these":[94],"different":[95,145],"concepts":[96],"can":[97],"be":[98],"specified":[99],"as":[100],"(Partially":[102],"Observable)":[103],"Markov":[104],"Decision":[105],"Process,":[106],"we":[108,128],"illustrate":[109],"with":[112],"running":[114],"example,":[115],"which":[116],"includes":[117],"notions":[118],"conflict,":[120],"critical":[121],"resource,":[122],"mitigation":[123],"auditing":[125],"decisions,":[126],"requests,":[136],"it":[137],"is":[138,152],"possible":[139,154],"calculate":[141],"optimal":[143],"naive":[148],"one.":[149],"optimization":[151],"still":[153],"even":[155],"several":[157],"probable":[158],"sequences":[159]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
