{"id":"https://openalex.org/W2793372807","doi":"https://doi.org/10.1109/tdsc.2018.2818708","title":"Automatic Extraction of Access Control Policies from Natural Language Documents","display_name":"Automatic Extraction of Access Control Policies from Natural Language Documents","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2793372807","doi":"https://doi.org/10.1109/tdsc.2018.2818708","mag":"2793372807"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2818708","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080397286","display_name":"Masoud Narouei","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Masoud Narouei","raw_affiliation_strings":["Department of Computer Sciene and Engineering, University of North Texas, Denton"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciene and Engineering, University of North Texas, Denton","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080052284","display_name":"Hassan Takabi","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hassan Takabi","raw_affiliation_strings":["Department of Computer Sciene and Engineering, University of North Texas, Denton"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciene and Engineering, University of North Texas, Denton","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089984025","display_name":"Rodney D. Nielsen","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rodney Nielsen","raw_affiliation_strings":["Department of Computer Sciene and Engineering, University of North Texas, Denton"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciene and Engineering, University of North Texas, Denton","institution_ids":["https://openalex.org/I123534392"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.408,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":31,"citation_normalized_percentile":{"value":0.932994,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10181","display_name":"Natural Language Processing Techniques","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8763593},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.69048166},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5287311},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.5080905},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5072774},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.50412285},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.46333352},{"id":"https://openalex.org/C195807954","wikidata":"https://www.wikidata.org/wiki/Q1662562","display_name":"Information extraction","level":2,"score":0.43653736},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.41142145},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3824108},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18948415},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.097634435},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2818708","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.72,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":38,"referenced_works":["https://openalex.org/W1493372904","https://openalex.org/W1535015163","https://openalex.org/W1567277581","https://openalex.org/W1709993618","https://openalex.org/W1965888476","https://openalex.org/W1967093286","https://openalex.org/W1990334093","https://openalex.org/W2001176075","https://openalex.org/W2021859872","https://openalex.org/W2027052495","https://openalex.org/W2028722148","https://openalex.org/W2066018628","https://openalex.org/W2080858550","https://openalex.org/W2093804985","https://openalex.org/W2098408481","https://openalex.org/W2098854124","https://openalex.org/W2107930672","https://openalex.org/W2115792525","https://openalex.org/W2123442489","https://openalex.org/W2126851059","https://openalex.org/W2138043057","https://openalex.org/W2145208835","https://openalex.org/W2145310422","https://openalex.org/W2146989366","https://openalex.org/W2149101014","https://openalex.org/W2150656895","https://openalex.org/W2151170651","https://openalex.org/W2153047972","https://openalex.org/W2158847908","https://openalex.org/W2158899491","https://openalex.org/W2160724118","https://openalex.org/W2251495238","https://openalex.org/W2273815277","https://openalex.org/W25469692","https://openalex.org/W2952230511","https://openalex.org/W4210997624","https://openalex.org/W4213168938","https://openalex.org/W595703368"],"related_works":["https://openalex.org/W4283377908","https://openalex.org/W3150023697","https://openalex.org/W2997567050","https://openalex.org/W2329000834","https://openalex.org/W2165504147","https://openalex.org/W2091777911","https://openalex.org/W2003050223","https://openalex.org/W1533421371","https://openalex.org/W1526712007","https://openalex.org/W1483272040"],"abstract_inverted_index":{"A":[0],"fundamental":[1],"management":[2],"responsibility":[3],"is":[4,79],"securing":[5],"information":[6,34],"systems.":[7],"Almost":[8],"all":[9],"applications":[10],"that":[11,65],"deal":[12],"with":[13,122],"safety,":[14],"privacy,":[15],"or":[16],"defense":[17],"include":[18,66],"some":[19],"form":[20],"of":[21,28,50,69,75,127,158,189],"access":[22,29,40,44,51,190],"control.":[23,45],"There":[24],"are":[25,142],"a":[26,67,98,186],"plethora":[27],"control":[30,41,52,191],"models":[31],"in":[32],"the":[33,47,76,132,156,178],"security":[35],"realm":[36],"such":[37,149],"as":[38,139,150],"role-based":[39],"and":[42,82,90,169,173],"attribute-based":[43],"However,":[46],"initial":[48],"development":[49],"policies":[53],"(ACPs)":[54],"can":[55],"be":[56],"very":[57],"challenging.":[58],"Most":[59],"organizations":[60],"have":[61],"high-level":[62],"requirement":[63],"specifications":[64],"set":[68],"ACPs,":[70],"which":[71,130],"describe":[72],"allowable":[73],"operations":[74],"system.":[77],"It":[78],"time":[80],"consuming":[81],"error-prone":[83],"to":[84,117,176],"manually":[85],"sift":[86],"through":[87],"these":[88],"documents":[89,108],"extract":[91],"ACPs.":[92],"In":[93],"this":[94],"paper,":[95],"we":[96,154],"propose":[97],"new":[99],"framework":[100],"towards":[101],"extracting":[102],"ACPs":[103],"from":[104],"unrestricted":[105],"natural":[106],"language":[107],"using":[109,162,184],"semantic":[110],"role":[111],"labeling":[112],"(SRL).":[113],"We":[114,165],"were":[115,174],"able":[116,175],"correctly":[118],"identify":[119],"ACP":[120],"elements":[121],"an":[123],"average":[124],"F1":[125],"score":[126],"75":[128],"percent,":[129],"bested":[131],"previous":[133],"work":[134],"by":[135,181],"15":[136],"percent.":[137],"Furthermore,":[138],"SRL":[140,160,179],"tools":[141],"often":[143],"trained":[144],"on":[145],"publicly":[146],"available":[147],"corpora":[148],"Wall":[151],"Street":[152],"Journal,":[153],"investigated":[155],"idea":[157],"improving":[159],"performance":[161,180],"domain-related":[163],"knowledge.":[164],"utilized":[166],"domain":[167],"adaptation":[168],"semi-supervised":[170],"learning":[171],"techniques":[172],"improve":[177],"2":[182],"percent":[183],"only":[185],"small":[187],"amount":[188],"data.":[192]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2793372807","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2025-01-21T02:21:40.488197","created_date":"2018-03-29"}