{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:51:34Z","timestamp":1732038694215,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354196","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"95-112","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["The Next 700 Policy Miners"],"prefix":"10.1145","author":[{"given":"Carlos","family":"Cotrini","sequence":"first","affiliation":[{"name":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Luca","family":"Corinzia","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Thilo","family":"Weghorn","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"David","family":"Basin","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"volume-title":"STARBAC: Spatiotemporal Role Based Access Control. In OTM Confederated International Conferences\" On the Move to Meaningful Internet Systems\". Springer, 1567--1582","year":"2007","author":"Aich Subhendu","key":"e_1_3_2_2_1_1"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098047"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2595222"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914656"},{"volume-title":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. ACM, 243--253","year":"2016","author":"Fadhel Ameni Ben","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041048.3041053"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065547"},{"key":"e_1_3_2_2_9_1","unstructured":"Christopher M Bishop. 2006. Pattern recognition and machine learning .springer. Christopher M Bishop. 2006. Pattern recognition and machine learning .springer."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875498"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1285773"},{"volume-title":"Mining Relationship-Based Access Control Policies. arXiv preprint arXiv:1708.04749","year":"2017","author":"Bui Thang","key":"e_1_3_2_2_12_1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_27"},{"key":"e_1_3_2_2_14_1","first-page":"264","article-title":"Generation of Attribute Based Access Control Policy from Existing Authorization System","volume":"9","author":"Chari Suresh N","year":"2016","journal-title":"US Patent"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368341"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914655"},{"volume-title":"European Working Session on Learning","author":"Clark Peter","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00011"},{"volume-title":"Analyzing First-order Role Based Access Control. In Computer Security Foundations Symposium (CSF)","year":"2015","author":"Cotrini Carlos","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.17"},{"volume-title":"Proceedings of the 28th annual ACM Symposium on Applied Computing. ACM, 1454--1461","author":"de Leoni Massimiliano","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10598-015-9281-2"},{"volume-title":"Mathematical logic","author":"Ebbinghaus H-D","key":"e_1_3_2_2_23_1"},{"volume-title":"A mathematical introduction to logic","author":"Enderton Herbert","key":"e_1_3_2_2_24_1"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377838"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"volume-title":"Proceedings of the 27th International Conference on Software Engineering. ACM, 196--205","year":"2005","author":"Fisler Kathi","key":"e_1_3_2_2_27_1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809851"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445567"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653675"},{"volume-title":"The elements of statistical learning","author":"Friedman Jerome","key":"e_1_3_2_2_32_1"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084163"},{"volume-title":"Oasis extensible access control markup language (XACML). OASIS Committee Secification CS-XACML-specification-1.0","year":"2002","author":"Godik Simon","key":"e_1_3_2_2_34_1"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.38"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.566806"},{"key":"e_1_3_2_2_37_1","unstructured":"Vincent C Hu David Ferraiolo Rick Kuhn Arthur R Friedman Alan J Lang Margaret M Cogdell Adam Schnitzer Kenneth Sandlin Robert Miller Karen Scarfone etal 2013. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication Vol. 800 162 (2013). Vincent C Hu David Ferraiolo Rick Kuhn Arthur R Friedman Alan J Lang Margaret M Cogdell Adam Schnitzer Kenneth Sandlin Robert Miller Karen Scarfone et al. 2013. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication Vol. 800 162 (2013)."},{"volume-title":"2012 IEEE International workshop on machine learning for signal processing. Amazon data science competition. http:\/\/mlsp2012","year":"2012","author":"IEEE.","key":"e_1_3_2_2_38_1"},{"volume-title":"Information theory and statistical mechanics. Physical review","year":"1957","author":"Jaynes Edwin T","key":"e_1_3_2_2_39_1"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.08.001"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.53"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45329-6_8"},{"key":"e_1_3_2_2_43_1","unstructured":"Kaggle. 2013. Amazon.com -- Employee access challenge. http:\/\/www.kaggle.com\/c\/amazon-employee-access-challenge Kaggle. 2013. Amazon.com -- Employee access challenge. http:\/\/www.kaggle.com\/c\/amazon-employee-access-challenge"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839510600779688"},{"volume-title":"Maximum Entropy and Bayesian Methods","author":"Kesavan HK","key":"e_1_3_2_2_45_1"},{"volume-title":"Optimization by simulated annealing. science","year":"1983","author":"Kirkpatrick Scott","key":"e_1_3_2_2_46_1"},{"volume-title":"How I administered PADL 2002 and","year":"2003","author":"Krishnamurthi Shriram","key":"e_1_3_2_2_47_1"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775435"},{"key":"e_1_3_2_2_49_1","unstructured":"Mahendra Kumar and Richard E Newman. 2006. STRBAC--An approach towards spatio-temporal role-based access control.. In Communication Network and Information Security. 150--155. Mahendra Kumar and Richard E Newman. 2006. STRBAC--An approach towards spatio-temporal role-based access control.. In Communication Network and Information Security. 150--155."},{"key":"e_1_3_2_2_50_1","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository. Amazon Access Samples Data Set. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Amazon+Access+Samples M. Lichman. 2013. UCI Machine Learning Repository. Amazon Access Samples Data Set. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Amazon+Access+Samples"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497438"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39256-6_5"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2746188.2746190"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.002"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2871148"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295145"},{"volume-title":"Proceedings of the 2Nd ACM Workshop on Attribute-Based Access Control (ABAC '17)","author":"Mukherjee Subhojeet","key":"e_1_3_2_2_57_1"},{"key":"e_1_3_2_2_58_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in pytorch. (2017). Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in pytorch. (2017)."},{"key":"e_1_3_2_2_59_1","unstructured":"David Martin Powers. 2011. Evaluation: from precision recall and F-measure to ROC informedness markedness and correlation. (2011). David Martin Powers. 2011. Evaluation: from precision recall and F-measure to ROC informedness markedness and correlation. (2011)."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73538-0_16"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726788"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.144705"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064008"},{"key":"e_1_3_2_2_64_1","unstructured":"Scikit-learn. 2007--2017. Tuning the hyper-parameters of an estimator. http:\/\/scikit-learn.org\/stable\/modules\/grid_search.html Scikit-learn. 2007--2017. Tuning the hyper-parameters of an estimator. http:\/\/scikit-learn.org\/stable\/modules\/grid_search.html"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420089653.ch10"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41483-6_6"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553498"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.30.2638"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542212"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_14"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_7"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805983"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180424"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295146"},{"volume-title":"Mining Attribute-Based Access Control Policies from Logs","author":"Xu Zhongyuan","key":"e_1_3_2_2_76_1"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369048"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2535728"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502584"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266862"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T17:39:37Z","timestamp":1673285977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354196"}},"subtitle":["A Universal Method for Building Policy Miners"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":80,"alternative-id":["10.1145\/3319535.3354196","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354196","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}