{"id":"https://openalex.org/W4411015536","doi":"https://doi.org/10.1145/3714393.3726510","title":"Enhancing Relationship-Based Access Control Policies with Negative Rule Mining","display_name":"Enhancing Relationship-Based Access Control Policies with Negative Rule Mining","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4411015536","doi":"https://doi.org/10.1145/3714393.3726510"},"language":"en","primary_location":{"id":"doi:10.1145/3714393.3726510","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726510","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726510","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726510","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087450858","display_name":"Ferhat Demirk\u0131ran","orcid":"https://orcid.org/0000-0001-7335-9370"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ferhat Demirkiran","raw_affiliation_strings":["University at Albany, Albany, NY, USA"],"raw_orcid":"https://orcid.org/0000-0001-7335-9370","affiliations":[{"raw_affiliation_string":"University at Albany, Albany, NY, USA","institution_ids":["https://openalex.org/I392282"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001727758","display_name":"Amir Masoumzadeh","orcid":"https://orcid.org/0000-0003-0647-7785"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amir Masoumzadeh","raw_affiliation_strings":["University at Albany, Albany, NY, USA"],"raw_orcid":"https://orcid.org/0000-0003-0647-7785","affiliations":[{"raw_affiliation_string":"University at Albany, Albany, NY, USA","institution_ids":["https://openalex.org/I392282"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087450858"],"corresponding_institution_ids":["https://openalex.org/I392282"],"apc_list":null,"apc_paid":null,"fwci":1.0744,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86470468,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5522621870040894},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4868685305118561},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.47767549753189087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28630584478378296},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2116313874721527}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5522621870040894},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4868685305118561},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.47767549753189087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28630584478378296},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2116313874721527}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3714393.3726510","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726510","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726510","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3714393.3726510","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726510","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726510","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4099999964237213,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2294197782","display_name":null,"funder_award_id":"2047623","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G4250640864","display_name":null,"funder_award_id":"2047623","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411015536.pdf","grobid_xml":"https://content.openalex.org/works/W4411015536.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1504510181","https://openalex.org/W1998591172","https://openalex.org/W2000107752","https://openalex.org/W2003752715","https://openalex.org/W2036467405","https://openalex.org/W2044471216","https://openalex.org/W2108004830","https://openalex.org/W2598247489","https://openalex.org/W2617428507","https://openalex.org/W2618541213","https://openalex.org/W2805336398","https://openalex.org/W2888685578","https://openalex.org/W2921287709","https://openalex.org/W2947413737","https://openalex.org/W3028881048","https://openalex.org/W3104845644","https://openalex.org/W3114308913","https://openalex.org/W3155736099","https://openalex.org/W4200526776","https://openalex.org/W4280649132","https://openalex.org/W4282555794","https://openalex.org/W4299351893"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Relationship-based":[0],"access":[1,83,128],"control":[2,129],"(ReBAC)":[3],"policies":[4,51,78],"often":[5],"rely":[6],"solely":[7],"on":[8,103],"positive":[9,55],"authorization":[10,26,58],"rules,":[11],"implicitly":[12],"denying":[13],"all":[14],"other":[15],"requests":[16],"by":[17,39],"default.":[18],"However,":[19],"many":[20],"scenarios":[21],"require":[22],"explicitly":[23],"stating":[24],"negative":[25,57,109,124],"rules":[27,59,110],"to":[28,48,112],"capture":[29],"exceptions":[30],"or":[31],"special":[32],"restrictions":[33],"that":[34,52,75,107],"are":[35],"not":[36],"naturally":[37],"enforced":[38],"deny-by-default":[40],"semantics.":[41],"This":[42],"work":[43],"presents":[44],"a":[45,96],"systematic":[46],"method":[47],"mine":[49],"ReBAC":[50],"integrate":[53],"both":[54],"and":[56,71,89,115],"from":[60],"observed":[61,82],"authorizations.":[62],"We":[63,85],"formalize":[64],"the":[65,87,120],"mining":[66],"problem,":[67],"show":[68],"its":[69],"NP-hardness,":[70],"develop":[72],"an":[73],"approach":[74,94],"identifies":[76],"minimal":[77],"while":[79],"accurately":[80],"reflecting":[81],"decisions.":[84],"demonstrate":[86,106],"feasibility":[88],"effectiveness":[90],"of":[91,98,122],"our":[92],"proposed":[93],"through":[95],"set":[97],"experiments.":[99],"Our":[100],"experimental":[101],"evaluations":[102],"representative":[104],"datasets":[105],"including":[108],"leads":[111],"more":[113],"concise":[114],"semantically":[116],"complete":[117],"policies,":[118],"confirming":[119],"necessity":[121],"explicit":[123],"authorizations":[125],"in":[126],"complex":[127],"settings.":[130]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
