{"id":"https://openalex.org/W3155736099","doi":"https://doi.org/10.1145/3422337.3447828","title":"Formal Analysis of ReBAC Policy Mining Feasibility","display_name":"Formal Analysis of ReBAC Policy Mining Feasibility","publication_year":2021,"publication_date":"2021-04-10","ids":{"openalex":"https://openalex.org/W3155736099","doi":"https://doi.org/10.1145/3422337.3447828","mag":"3155736099"},"language":"en","primary_location":{"id":"doi:10.1145/3422337.3447828","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3447828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029903273","display_name":"Shuvra Chakraborty","orcid":null},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shuvra Chakraborty","raw_affiliation_strings":["The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038692973","display_name":"Ravi Sandhu","orcid":"https://orcid.org/0000-0002-3165-1813"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ravi Sandhu","raw_affiliation_strings":["The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029903273"],"corresponding_institution_ids":["https://openalex.org/I45438204"],"apc_list":null,"apc_paid":null,"fwci":2.2757,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8996987,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7623952031135559},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.7107731699943542},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5725052356719971},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5556758642196655},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.546589732170105},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5241016149520874},{"id":"https://openalex.org/keywords/policy-analysis","display_name":"Policy analysis","score":0.43087801337242126},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.374738872051239},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36718761920928955},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22147232294082642},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1796882450580597}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7623952031135559},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.7107731699943542},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5725052356719971},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5556758642196655},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.546589732170105},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5241016149520874},{"id":"https://openalex.org/C123587114","wikidata":"https://www.wikidata.org/wiki/Q2101508","display_name":"Policy analysis","level":2,"score":0.43087801337242126},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.374738872051239},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36718761920928955},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22147232294082642},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1796882450580597},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3422337.3447828","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3447828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W8344579","https://openalex.org/W1869701259","https://openalex.org/W1981058821","https://openalex.org/W1998591172","https://openalex.org/W2036467405","https://openalex.org/W2154765153","https://openalex.org/W2484267258","https://openalex.org/W2567425774","https://openalex.org/W2598247489","https://openalex.org/W2618541213","https://openalex.org/W2749040653","https://openalex.org/W2888685578","https://openalex.org/W2911573676","https://openalex.org/W2921287709","https://openalex.org/W2943281966","https://openalex.org/W2947413737","https://openalex.org/W2973335188","https://openalex.org/W3009231592","https://openalex.org/W3028881048","https://openalex.org/W3104845644","https://openalex.org/W4246021717"],"related_works":["https://openalex.org/W2123296434","https://openalex.org/W2555738791","https://openalex.org/W4298042445","https://openalex.org/W2104547074","https://openalex.org/W2132693790","https://openalex.org/W2017675414","https://openalex.org/W1593822213","https://openalex.org/W2095975812","https://openalex.org/W2367441718","https://openalex.org/W2017616439"],"abstract_inverted_index":{"Relationship-Based":[0],"Access":[1],"Control":[2],"(ReBAC)":[3],"expresses":[4],"authorization":[5],"in":[6,35,46,56,153,162],"terms":[7],"of":[8,42,48,155,204],"various":[9,57,206],"direct":[10],"and":[11,59,120,142,167,183],"indirect":[12],"relationships":[13,166],"amongst":[14,91],"entities,":[15],"most":[16],"commonly":[17],"between":[18],"users.":[19],"The":[20],"need":[21],"for":[22,81],"ReBAC":[23,43,100,106,113,131,157],"policy":[24,44,66,101,107,114,118,132,140,158,191],"mining":[25,45,67,108,133],"arises":[26,55],"when":[27],"an":[28],"existing":[29],"access":[30],"control":[31],"system":[32],"is":[33,74,103,124],"reformulated":[34],"ReBAC.":[36],"This":[37],"paper":[38],"considers":[39],"the":[40,65,116,128,147,163,175],"feasibility":[41,134,180],"context":[47,154],"user":[49,51,77,79,84],"to":[50,78,110,127,145,173],"authorization,":[52],"such":[53,138],"as":[54,197],"social":[58],"business":[60],"contexts.":[61],"In":[62,202],"accordance":[63],"with":[64,87,115],"literature,":[68],"we":[69,198],"assume":[70],"that":[71,169,189],"complete":[72,88],"data":[73,90],"provided":[75],"regarding":[76],"authorizations":[80],"a":[82,95,112,139,179],"given":[83,117,129],"set,":[85],"along":[86],"relationship":[89,97,121],"these":[92],"users":[93],"comprising":[94],"labeled":[96],"graph.":[98],"A":[99],"language":[102,119],"also":[104],"specified.":[105],"seeks":[109],"formulate":[111],"graph,":[122],"which":[123,160],"exactly":[125],"equivalent":[126],"authorizations.":[130],"problem":[135,152],"asks":[136],"whether":[137],"exists":[141],"if":[143],"so":[144],"provide":[146],"policy.":[148,176],"We":[149,177,187],"investigate":[150],"this":[151],"different":[156],"languages":[159,192],"differ":[161],"relationships,":[164],"inverse":[165],"non-relationships":[168],"can":[170],"be":[171],"used":[172],"build":[174],"develop":[178],"detection":[181],"algorithm":[182],"analyze":[184],"its":[185],"complexity.":[186],"show":[188],"our":[190],"are":[193,209],"progressively":[194],"more":[195],"expressive":[196],"introduce":[199],"additional":[200],"capability.":[201],"case":[203],"infeasibility,":[205],"solution":[207],"approaches":[208],"discussed.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
