
Anna Bamberger, M. F. (2024). Automated generation and
update of structured abac policies. In ACM Workshop
on Secure and Trustworthy Cyber-Physical Systems,
page 31–40.
Bertino, E., Bonatti, P. A., and Ferrari, E. (2001). Tr-
bac: A temporal role-based access control model.
ACM Transaction on Information & System Securiry,
4(3):191–233.
Cao, Y., Lien, S.-Y., and Liang, Y.-C. (2021). Deep re-
inforcement learning for multi-user access control in
non-terrestrial networks. IEEE Transactions on Com-
munications, 69(3):1605–1619.
Carminati, B., Ferrari, E., and Perego, A. (2006). Rule-
based access control for social networks. In On the
Move to Meaningful Internet Systems 2006: OTM
2006 Workshops, pages 1734–1744.
Chatterjee, A., Pitroda, Y., and Parmar, M. (2020). Dy-
namic role-based access control for decentralized ap-
plications. In ICBC 2020, page 185–197.
Chaturvedi, G. K. and Shirole, M. (2024). Abac-pa2:
Attribute-based access control model with privacy
aware anonymous access. Procedia Computer Sci-
ence, 237:147–154.
Cotrini, C., Weghorn, T., and Basin, D. (2018). Mining
abac rules from sparse logs. In 2018 IEEE European
Symposium on Security and Privacy, pages 31–46.
Damiani, M. L., Bertino, E., Catania, B., and Perlasca, P.
(2007). Geo-rbac: A spatially aware rbac. ACM
Transactions on Information and System Security,
10:2–es.
Gautam, M., Jha, S., Sural, S., Vaidya, J., and Atluri, V.
(2017). Constrained policy mining in attribute based
access control. In 22nd ACM on Symposium on Access
Control Models and Technologies, page 121–123.
Gumma, V., Mitra, B., Dey, S., Patel, P. S., Suman, S., Das,
S., and Vaidya, J. (2022). Pammela: Policy adminis-
tration methodology using machine learning. In 19th
International Conference on Security and Cryptogra-
phy - SECRYPT, pages 147–157.
Gupta, M. and Sandhu, R. (2021). Towards activity-centric
access control for smart collaborative ecosystems. In
26th ACM Symposium on Access Control Models and
Technologies, page 155–164.
Hu, V. C., Ferraiolo, D., Kuhn, R., Friedman, A. R., Lang,
A. J., Cogdell, M. M., Schnitzer, A., Sandlin, K.,
Miller, R., Scarfone, K., et al. (2013). Guide to at-
tribute based access control (abac) definition and con-
siderations (draft). NIST special publication, 800:1–
54.
Iyer, P. and Masoumzadeh, A. (2018). Mining positive and
negative attribute-based access control policy rules. In
23nd ACM on Symposium on Access Control Models
and Technologies, page 161–172.
Jabal, A. A., Bertino, E., Lobo, J., Law, M., Russo, A., Calo,
S., and Verma, D. (2020). Polisma - a framework for
learning attribute-based access control policies. In Eu-
ropean Symposium on Research in Computer Security,
volume 12308, pages 523–544.
Karimi, L., Aldairi, M., Joshi, J., and Abdelhakim, M.
(2022). An automatic attribute-based access control
policy extraction from access logs. IEEE Transactions
on Dependable and Secure Computing, 19:3–16.
Liu, L. and Antonopoulos, N. (2010). From Client-Server to
P2P Networking, pages 71–89. Springer US, Boston,
MA.
McMahan, B., Moore, E., Ramage, D., Zhang, S., L
´
eon,
D., and Snoek, M. (2016). Communication-efficient
learning of deep networks from decentralized data.
arXiv preprint arXiv:1602.05629.
Mocanu, D., Turkmen, F., and Liotta, A. (2015). Towards
abac policy mining from logs with deep learning. In
18th International Multiconference, IS 2015, Intelli-
gent Systems.
Narouei, M. and Takabi, H. (2019). A nature-inspired
framework for optimal mining of attribute-based ac-
cess control policies. In Security and Privacy in Com-
munication Networks, pages 489–506. Springer Inter-
national Publishing.
Nobi, M. N., Krishnan, R., Huang, Y., and Sandhu, R.
(2022a). Administration of machine learning based
access control. In Computer Security – ESORICS
2022: 27th European Symposium on Research in
Computer Security,Part II, pages 189–210.
Nobi, M. N., Krishnan, R., Huang, Y., Shakarami, M., and
Sandhu, R. (2022b). Toward deep learning based ac-
cess control. In 12th ACM Conference on Data and
Application Security and Privacy, page 143–154.
Ricci, L. and Carlini, E. (2012). Distributed virtual envi-
ronments: From client server to cloud and p2p archi-
tectures. In 2012 International Conference on High
Performance Computing & Simulation (HPCS), pages
8–17.
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C.
(1996). Role-based access control models. Computer,
29:38–47.
Shan, F., Wang, Z., Liu, M., and Zhang, M. (2024). Au-
tomatic generation of attribute-based access control
policies from natural language documents. Comput-
ers, Materials and Continua, 80:3881–3902.
Sikder, A. K., Babun, L., Celik, Z. B., Aksu, H., McDaniel,
P., Kirda, E., and Uluagac, A. S. (2022). Who’s con-
trolling my device? multi-user multi-device-aware ac-
cess control system for shared smart home environ-
ment. ACM Trans. Internet Things, 3.
Talukdar, T., Batra, G., Vaidya, J., Atluri, V., and Sural,
S. (2017). Efficient bottom-up mining of attribute
based access control policies. In 2017 IEEE 3rd In-
ternational Conference on Collaboration and Internet
Computing, pages 339–348.
Xu, Z. and Stoller, S. D. (2014). Mining attribute-based
access control policies from logs. In Data and Appli-
cations Security and Privacy XXVIII.
Xu, Z. and Stoller, S. D. (2015). Mining attribute-based ac-
cess control policies. IEEE Trans. Dependable Secur.
Comput., 12:533–545.
Zhong, H., Zhou, Y., Zhang, Q., Xu, Y., and Cui, J. (2021).
An efficient and outsourcing-supported attribute-
based access control scheme for edge-enabled smart
healthcare. Future Generation Computer Systems,
115:486–496.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
514