{"id":"https://openalex.org/W2947965029","doi":"https://doi.org/10.1145/3322431.3326329","title":"Toward Detection of Access Control Models from Source Code via Word Embedding","display_name":"Toward Detection of Access Control Models from Source Code via Word Embedding","publication_year":2019,"publication_date":"2019-05-28","ids":{"openalex":"https://openalex.org/W2947965029","doi":"https://doi.org/10.1145/3322431.3326329","mag":"2947965029"},"language":"en","primary_location":{"id":"doi:10.1145/3322431.3326329","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3326329","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3326329","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3326329","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103039077","display_name":"John Heaps","orcid":"https://orcid.org/0000-0002-4038-4278"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"John Heaps","raw_affiliation_strings":["University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101558050","display_name":"Xiaoyin Wang","orcid":"https://orcid.org/0000-0002-9079-5534"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoyin Wang","raw_affiliation_strings":["University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006266551","display_name":"Travis D. Breaux","orcid":"https://orcid.org/0000-0001-7127-8155"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Travis Breaux","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103041668","display_name":"Jianwei Niu","orcid":"https://orcid.org/0000-0002-5667-3285"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jianwei Niu","raw_affiliation_strings":["University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103039077"],"corresponding_institution_ids":["https://openalex.org/I45438204"],"apc_list":null,"apc_paid":null,"fwci":0.5323,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76790858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"103","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.840872585773468},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.6271806359291077},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6203839778900146},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.6085588335990906},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6054607629776001},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5573399662971497},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5453455448150635},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.504067063331604},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4991793632507324},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.46770140528678894},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.46114474534988403},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4538912773132324},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.36362218856811523},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23193040490150452},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16723763942718506}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.840872585773468},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.6271806359291077},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6203839778900146},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.6085588335990906},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6054607629776001},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5573399662971497},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5453455448150635},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.504067063331604},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4991793632507324},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.46770140528678894},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.46114474534988403},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4538912773132324},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.36362218856811523},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23193040490150452},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16723763942718506},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3322431.3326329","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3326329","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3326329","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3322431.3326329","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3322431.3326329","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3322431.3326329","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2257890507","display_name":null,"funder_award_id":"1736209","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2375571827","display_name":null,"funder_award_id":"1748109","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G645906881","display_name":null,"funder_award_id":"1846467","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2947965029.pdf","grobid_xml":"https://content.openalex.org/works/W2947965029.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1485912969","https://openalex.org/W2018389835","https://openalex.org/W2112796928","https://openalex.org/W2142403498","https://openalex.org/W2153579005","https://openalex.org/W2250539671","https://openalex.org/W2504108613","https://openalex.org/W2511803001","https://openalex.org/W2740130862","https://openalex.org/W2795150841","https://openalex.org/W2950577311","https://openalex.org/W2953384591","https://openalex.org/W2962960733","https://openalex.org/W2963355447","https://openalex.org/W2964150020","https://openalex.org/W3005951744"],"related_works":["https://openalex.org/W2081900870","https://openalex.org/W2183306018","https://openalex.org/W2549990292","https://openalex.org/W2345479200","https://openalex.org/W4226026301","https://openalex.org/W4360993851","https://openalex.org/W2911655849","https://openalex.org/W4286432911","https://openalex.org/W3134737443","https://openalex.org/W2942293597"],"abstract_inverted_index":{"Advancement":[0],"in":[1,5,60],"machine":[2],"learning":[3,12,38,62,75],"techniques":[4,63],"recent":[6],"years":[7],"has":[8,29],"led":[9],"to":[10,42,64,73],"deep":[11,37],"applications":[13],"on":[14,23,83],"source":[15],"code.":[16],"While":[17],"there":[18],"is":[19],"little":[20],"research":[21],"available":[22],"the":[24,26,80],"subject,":[25],"work":[27,82],"that":[28],"been":[30],"done":[31],"shows":[32],"great":[33],"potential.":[34],"We":[35,77],"believe":[36],"can":[39,96],"be":[40,97],"leveraged":[41],"obtain":[43],"new":[44],"insight":[45],"into":[46],"automated":[47],"access":[48,65,85,91],"control":[49,86,92],"policy":[50,93],"verification.":[51],"In":[52],"this":[53],"paper,":[54],"we":[55],"describe":[56],"our":[57],"first":[58],"step":[59],"applying":[61],"control,":[66],"which":[67,95],"consists":[68],"of":[69],"developing":[70],"word":[71,100],"embeddings":[72],"bootstrap":[74],"tasks.":[76],"also":[78],"discuss":[79],"future":[81],"identifying":[84],"enforcement":[87],"code":[88],"and":[89],"checking":[90],"violations,":[94],"enabled":[98],"by":[99],"embeddings.":[101]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
