{"id":"https://openalex.org/W4377966266","doi":"https://doi.org/10.1145/3589608.3593841","title":"Qualitative Intention-aware Attribute-based Access Control Policy Refinement","display_name":"Qualitative Intention-aware Attribute-based Access Control Policy Refinement","publication_year":2023,"publication_date":"2023-05-24","ids":{"openalex":"https://openalex.org/W4377966266","doi":"https://doi.org/10.1145/3589608.3593841"},"language":"en","primary_location":{"id":"doi:10.1145/3589608.3593841","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3589608.3593841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026059302","display_name":"Shohei Mitani","orcid":"https://orcid.org/0009-0002-4954-8061"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shohei Mitani","raw_affiliation_strings":["NEC Corporation, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Corporation, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055794339","display_name":"Jonghoon Kwon","orcid":"https://orcid.org/0000-0002-3853-242X"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Jonghoon Kwon","raw_affiliation_strings":["ETH Z\u00fcrich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090492024","display_name":"Nakul D. Ghate","orcid":"https://orcid.org/0000-0001-5811-4789"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nakul Ghate","raw_affiliation_strings":["NEC Corporation, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Corporation, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086071081","display_name":"Taniya Singh","orcid":"https://orcid.org/0009-0002-9119-528X"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Taniya Singh","raw_affiliation_strings":["NEC Corporation, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Corporation, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022766468","display_name":"Hirofumi Ueda","orcid":"https://orcid.org/0009-0008-4873-7534"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hirofumi Ueda","raw_affiliation_strings":["NEC Corporation, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Corporation, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056518136","display_name":"Adrian Perrig","orcid":"https://orcid.org/0000-0002-5280-5412"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Adrian Perrig","raw_affiliation_strings":["ETH Z\u00fcrich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5026059302"],"corresponding_institution_ids":["https://openalex.org/I118347220"],"apc_list":null,"apc_paid":null,"fwci":1.1571,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.82475828,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.801048994064331},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.77361661195755},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5523414015769958},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.485956072807312},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4548705816268921},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4272627532482147},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41305121779441833},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.27110302448272705},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17539140582084656}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.801048994064331},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77361661195755},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5523414015769958},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.485956072807312},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4548705816268921},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4272627532482147},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41305121779441833},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27110302448272705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17539140582084656},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3589608.3593841","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3589608.3593841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321652","display_name":"Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich","ror":"https://ror.org/05a28rw58"},{"id":"https://openalex.org/F4320336702","display_name":"Zurich Information Security and Privacy Center","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2097171586","https://openalex.org/W2121585245","https://openalex.org/W2135411360","https://openalex.org/W2154889864","https://openalex.org/W2295598076","https://openalex.org/W2518093493","https://openalex.org/W2817857516","https://openalex.org/W2887693548","https://openalex.org/W2913369986","https://openalex.org/W2914393402","https://openalex.org/W2914854069","https://openalex.org/W2962744771","https://openalex.org/W2991141347","https://openalex.org/W3007490601","https://openalex.org/W3029768991","https://openalex.org/W3083080580","https://openalex.org/W4220931512","https://openalex.org/W4389138872"],"related_works":["https://openalex.org/W4255837520","https://openalex.org/W2387011115","https://openalex.org/W4234808182","https://openalex.org/W2382043075","https://openalex.org/W2809151339","https://openalex.org/W2360673138","https://openalex.org/W2809370583","https://openalex.org/W4301447905","https://openalex.org/W2333722679","https://openalex.org/W4255628145"],"abstract_inverted_index":{"Designing":[0],"access":[1,38,100,136],"control":[2],"policies":[3],"is":[4,130],"often":[5],"expensive":[6],"and":[7,15,22,42,115,164],"tedious":[8],"due":[9],"to":[10,98,124],"the":[11,47,90,109,121,133,139,154,166],"heterogeneous":[12],"systems,":[13],"services,":[14],"diverse":[16],"user":[17],"demands.":[18],"Although":[19],"ABAC":[20],"policy":[21,91,123,141,156],"decision":[23,72,85,127],"engine":[24,73,128],"creation":[25],"methods":[26,170],"based":[27],"on":[28],"machine":[29,168],"learning":[30,169],"have":[31],"been":[32],"proposed,":[33],"they":[34],"cannot":[35],"make":[36],"good":[37],"decisions":[39,77,101,137],"for":[40,132],"applications":[41],"situations":[43],"not":[44],"envisioned":[45],"by":[46,82,157,171],"decision-makers":[48],"who":[49],"provide":[50],"training":[51],"examples.":[52],"It":[53,69],"results":[54,148],"in":[55,135,162,176],"over-and":[56],"under-permissiveness.":[57],"In":[58,108],"this":[59],"paper,":[60],"we":[61,111],"propose":[62],"a":[63,71,113,126,145,158,172],"framework":[64],"that":[65,74,103,129,150],"refines":[66],"pre-developed":[67],"policies.":[68,80],"creates":[70],"makes":[75],"better":[76],"than":[78],"those":[79],"Inspired":[81],"multiple":[83],"criteria":[84],"theory,":[86],"our":[87,151],"method":[88,152],"uses":[89],"manager's":[92],"qualitative":[93],"intentions":[94],"behind":[95],"their":[96],"judgments":[97],"guide":[99],"so":[102],"more":[104],"benefits":[105],"are":[106],"expected.":[107],"evaluation,":[110],"prepare":[112],"coarse":[114,122,155],"relatively":[116],"elaborate":[117,140],"policy.":[118],"We":[119],"refine":[120],"obtain":[125],"compared":[131],"similarity":[134],"with":[138],"using":[142],"AUC":[143,163],"as":[144],"measure.":[146],"The":[147],"show":[149],"improves":[153],"difference":[159,173],"of":[160,174],"12-26%":[161],"outperforms":[165],"conventional":[167],"3-11%":[175],"AUC.":[177]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
