{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T19:01:39Z","timestamp":1768590099586,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03467-z","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T14:15:53Z","timestamp":1732544153000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Fast Access Control Method in IoT Using XGB"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1038-4282","authenticated-orcid":false,"given":"Surendra","family":"Tyagi","sequence":"first","affiliation":[]},{"given":"Yamuna","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"Devesh C.","family":"Jinwala","sequence":"additional","affiliation":[]},{"given":"Subhasis","family":"Bhattacharjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"3467_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.comnet.2016.11.007","volume":"112","author":"A Ouaddah","year":"2017","unstructured":"Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA. Access control in the internet of things: big challenges and new opportunities. Comput Netw. 2017;112:237\u201362. https:\/\/doi.org\/10.1016\/j.comnet.2016.11.007.","journal-title":"Comput Netw"},{"issue":"3","key":"3467_CR2","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1145\/320263.320288","volume":"3","author":"R Fagin","year":"1978","unstructured":"Fagin R. On an authorization mechanism. ACM Trans Database Syst (TODS). 1978;3(3):310\u20139.","journal-title":"ACM Trans Database Syst (TODS)"},{"key":"3467_CR3","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s12243-019-00709-7","volume":"74","author":"E Bertin","year":"2019","unstructured":"Bertin E, Hussein D, Sengul C, Vincent F. Access control in the internet of things: a survey of existing approaches and open research questions. Ann Telecommun. 2019;74:375\u201388. https:\/\/doi.org\/10.1007\/s12243-019-00709-7.","journal-title":"Ann Telecommun"},{"key":"3467_CR4","doi-asserted-by":"publisher","unstructured":"Bai Q, Zheng Y. Study on the access control model. In: Proceedings of 2011 cross strait quad-regional radio science and wireless technology conference, vol. 1. 2011. p. 830\u20134. https:\/\/doi.org\/10.1109\/CSQRWC.2011.6037079.","DOI":"10.1109\/CSQRWC.2011.6037079"},{"key":"3467_CR5","doi-asserted-by":"publisher","unstructured":"Ho TK. Random decision forests. In: Proceedings of 3rd international conference on document analysis and recognition, vol. 1. 1995. p. 278\u201382. https:\/\/doi.org\/10.1109\/ICDAR.1995.598994.","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"3467_CR6","unstructured":"Brownlee J. Data preparation for gradient boosting with XGBoost in Python. https:\/\/machinelearningmastery.com\/data-preparation-gradient-boosting-xgboost-python\/. Accessed 31 Jan 2024."},{"key":"3467_CR7","unstructured":"Unknown U. Categorical data\u2014xgboost 1.7.6 documentation. https:\/\/xgboost.readthedocs.io\/en\/stable\/tutorials\/categorical.html. Accessed 31 Jan 2024."},{"key":"3467_CR8","doi-asserted-by":"crossref","unstructured":"Podlodowski \u0141, Koz\u0142owski M. Application of xgboost to the cyber-security problem of detecting suspicious network traffic events. In: 2019 IEEE International Conference on Big Data (Big Data). 2019. p. 5902\u20137.","DOI":"10.1109\/BigData47090.2019.9006586"},{"key":"3467_CR9","doi-asserted-by":"publisher","unstructured":"Karhunen J, Raiko T, Cho K. Unsupervised deep learning: a short review. In: Advances in independent component analysis and learning machines. 2015. p. 125\u201342. https:\/\/doi.org\/10.1016\/B978-0-12-802806-3.00007-5.","DOI":"10.1016\/B978-0-12-802806-3.00007-5"},{"key":"3467_CR10","doi-asserted-by":"publisher","unstructured":"Cappelletti L, Valtolina S, Valentini G, Mesiti M, Bertino E. On the quality of classification models for inferring abac policies from access logs. In: 2019 IEEE International Conference on Big Data (Big Data). 2019. p. 4000\u20137. https:\/\/doi.org\/10.1109\/BigData47090.2019.9005959.","DOI":"10.1109\/BigData47090.2019.9005959"},{"key":"3467_CR11","doi-asserted-by":"crossref","unstructured":"Benkaouz Y, Erradi M, Freisleben B. Work in progress: K-nearest neighbors techniques for abac policies clustering. In: Proceedings of the 2016 ACM international workshop on attribute based access control, vol. 1. 2016. p. 72\u20135.","DOI":"10.1145\/2875491.2875497"},{"key":"3467_CR12","doi-asserted-by":"publisher","first-page":"130840","DOI":"10.1109\/ACCESS.2020.3008830","volume":"8","author":"C Verma","year":"2020","unstructured":"Verma C, Stoffov\u00e1 V, Ill\u00e9s Z, Tanwar S, Kumar N. Machine learning-based student\u2019s native place identification for real-time. IEEE Access. 2020;8:130840\u201354.","journal-title":"IEEE Access"},{"key":"3467_CR13","doi-asserted-by":"publisher","unstructured":"Alohaly M, Takabi H, Blanco E. Towards an automated extraction of abac constraints from natural language policies. In: ICT systems security and privacy protection. 2019. p. 105\u201319. https:\/\/doi.org\/10.1007\/978-3-030-22312-0_8.","DOI":"10.1007\/978-3-030-22312-0_8"},{"issue":"4","key":"3467_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2445566.2445567","volume":"15","author":"M Frank","year":"2013","unstructured":"Frank M, et al. Role mining with probabilistic models. ACM Trans Inf Syst Secur (TISSEC). 2013;15(4):1\u201328.","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"3467_CR15","doi-asserted-by":"publisher","unstructured":"Xu Z, Stoller SD. Algorithms for mining meaningful roles. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. SACMAT, vol. 12. 2012. p. 57\u201366. https:\/\/doi.org\/10.1145\/2295136.2295146.","DOI":"10.1145\/2295136.2295146"},{"key":"3467_CR16","doi-asserted-by":"publisher","first-page":"615","DOI":"10.31577\/cai_2023_3_615","volume":"42","author":"S Quan","year":"2023","unstructured":"Quan S, Zhao Y, Helil N. Attribute-based access control policy generation approach from access logs based on the catboost. Comput Inform. 2023;42:615\u201350. https:\/\/doi.org\/10.31577\/cai_2023_3_615.","journal-title":"Comput Inform"},{"key":"3467_CR17","doi-asserted-by":"crossref","unstructured":"El\u00a0Hadj MA, Benkaouz Y, Freisleben B, Erradi M. Abac rule reduction via similarity computation. In: International conference on networked systems. 2017. p. 86\u2013100.","DOI":"10.1007\/978-3-319-59647-1_7"},{"key":"3467_CR18","doi-asserted-by":"crossref","unstructured":"Narouei M, Khanpour H, Takabi H. Towards a top-down policy engineering framework for attribute-based access control. In: Proceedings of the 22nd ACM on symposium on access control models and technologies. 2017. p. 103\u201314.","DOI":"10.1145\/3078861.3078874"},{"key":"3467_CR19","doi-asserted-by":"publisher","unstructured":"Heaps J, Krishnan R, Huang Y, Niu J, Sandhu R. Access control policy generation from user stories using machine learning. In: Data and applications security and privacy XXXV. 2021. p. 171\u201388. https:\/\/doi.org\/10.1007\/978-3-030-81242-3_10.","DOI":"10.1007\/978-3-030-81242-3_10"},{"key":"3467_CR20","doi-asserted-by":"publisher","unstructured":"Abu\u00a0Jabal A, Bertino E, Lobo J, Law M, Russo A, Calo S, Verma D. Polisma\u2014a framework for learning attribute-based access control policies. In: Computer Security\u2014ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I, vol. 25. 2020. p. 523\u201344. https:\/\/doi.org\/10.1007\/978-3-030-58951-6_26.","DOI":"10.1007\/978-3-030-58951-6_26"},{"key":"3467_CR21","unstructured":"Karimi L, Abdelhakim M, Joshi J. Adaptive abac policy learning: a reinforcement learning approach. 2021. arXiv:2105.08587."},{"issue":"4","key":"3467_CR22","doi-asserted-by":"publisher","first-page":"2304","DOI":"10.1109\/TDSC.2021.3054331","volume":"19","author":"L Karimi","year":"2020","unstructured":"Karimi L, Aldairi M, Joshi J, Abdelhakim M. An automatic attribute-based access control policy extraction from access logs. IEEE Trans Dependable Secure Comput. 2020;19(4):2304\u201317.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"3467_CR23","doi-asserted-by":"publisher","unstructured":"Karimi L, Joshi J. An unsupervised learning based approach for mining attribute based access control policies. In: 2018 IEEE International Conference on Big Data (Big Data). 2018. p. 1427\u201336. https:\/\/doi.org\/10.1109\/BigData.2018.8622037.","DOI":"10.1109\/BigData.2018.8622037"},{"key":"3467_CR24","unstructured":"Mocanu D, Turkmen F, Liotta A. Towards abac policy mining from logs with deep learning. In: In: Proceedings of the 18th International Multiconference, IS 2015, Intelligent Systems. 2015."},{"key":"3467_CR25","unstructured":"Nobi MN, Gupta M, Praharaj L, Abdelsalam M, Krishnan R, Sandhu R. Machine learning in access control: a taxonomy and survey. 2022. arXiv preprint arXiv:2007.01739."},{"key":"3467_CR26","doi-asserted-by":"publisher","unstructured":"Molloy I, Lobo J, Chari S. Adversaries\u2019 holy grail: access control analytics. In: Proceedings of the first workshop on building analysis datasets and gathering experience returns for security. 2011. p. 54\u201361. https:\/\/doi.org\/10.1145\/1978672.1978679.","DOI":"10.1145\/1978672.1978679"},{"key":"3467_CR27","doi-asserted-by":"crossref","unstructured":"Bui T, Stoller SD. Learning attribute-based and relationship-based access control policies with unknown values. In: International conference on information systems security. 2020. p. 23\u201344.","DOI":"10.1007\/978-3-030-65610-2_2"},{"key":"3467_CR28","doi-asserted-by":"publisher","unstructured":"Nobi M, Krishnan R, Huang Y, Shakarami M, Sandhu R. Toward deep learning based access control. In: ACM CODASPY. 2022. p. 143\u201354. https:\/\/doi.org\/10.1145\/3508398.3511497.","DOI":"10.1145\/3508398.3511497"},{"key":"3467_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3229161","author":"V Borisov","year":"2022","unstructured":"Borisov V, Leemann T, Se\u00dfler K, Haug J, Pawelczyk M, Kasneci G. Deep neural networks and tabular data: a survey. IEEE Trans Neural Netw Learn Syst. 2022. https:\/\/doi.org\/10.1109\/TNNLS.2022.3229161.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"3467_CR30","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-030-82786-1_11","volume-title":"Privacy and the Internet of Things","author":"HR Lipford","year":"2022","unstructured":"Lipford HR, Tabassum M, Bahirat P, Yao Y, Knijnenburg BP. Privacy and the Internet of Things. Cham: Springer; 2022. p. 233\u201364. https:\/\/doi.org\/10.1007\/978-3-030-82786-1_11."},{"issue":"4","key":"3467_CR31","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/j.dcan.2020.12.002","volume":"7","author":"TJ Saleem","year":"2021","unstructured":"Saleem TJ, Chishti MA. Deep learning for the internet of things: potential benefits and use-cases. Digit Commun Netw. 2021;7(4):526\u201342. https:\/\/doi.org\/10.1016\/j.dcan.2020.12.002.","journal-title":"Digit Commun Netw"},{"key":"3467_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2023.03.006","author":"V Gugueoth","year":"2023","unstructured":"Gugueoth V, Safavat S, Shetty S. Security of internet of things (IoT) using federated learning and deep learning\u2014recent advancements, issues and prospects. ICT Express. 2023. https:\/\/doi.org\/10.1016\/j.icte.2023.03.006.","journal-title":"ICT Express"},{"key":"3467_CR33","doi-asserted-by":"crossref","unstructured":"Hu VC. Machine learning for access control policy verification. Technical report, NIST Interagency\/Internal Report (NISTIR), 8360. 2021.","DOI":"10.6028\/NIST.IR.8360"},{"key":"3467_CR34","doi-asserted-by":"publisher","unstructured":"Elsayed M, Abdelkader H, Abdelwahab A. Deep learning models for heterogeneous big data analytics. In: 15th International Conference on Computer Engineering and Systems (ICCES). 2020. p. 1\u20135. https:\/\/doi.org\/10.1109\/ICCES51560.2020.9334569.","DOI":"10.1109\/ICCES51560.2020.9334569"},{"key":"3467_CR35","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1109\/TIFS.2019.2943236","volume":"15","author":"G Shao","year":"2020","unstructured":"Shao G, Chen X, Zeng X, Wang L. Deep learning hierarchical representation from heterogeneous flow-level communication data. IEEE Trans Inf Forensics Secur. 2020;15:1525\u201340. https:\/\/doi.org\/10.1109\/TIFS.2019.2943236.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3467_CR36","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016. p. 770\u20138.","DOI":"10.1109\/CVPR.2016.90"},{"key":"3467_CR37","doi-asserted-by":"crossref","unstructured":"Faysal JA, Mostafa ST, Tamanna JS, Mumenin KM, Arifin MM, Awal MA, Shome A, Mostafa SS. Xgb-rf: a hybrid machine learning approach for IoT intrusion detection. In: Telecom, vol. 3. 2022. p. 52\u201369.","DOI":"10.3390\/telecom3010003"},{"key":"3467_CR38","unstructured":"Unknown U. GitHub-dlbac\/DlbacAlpha. https:\/\/github.com\/dlbac\/DlbacAlpha. Accessed 19 Mar 2024."},{"key":"3467_CR39","unstructured":"Unknown, U. IEEE International Workshop on Machine Learning for Signal Processing (MLSP 2013). 2013. https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/6648476\/proceeding."},{"key":"3467_CR40","doi-asserted-by":"publisher","unstructured":"Cook D, Crandall A, Thomas B. Human activity recognition from continuous ambient sensor data. UCI Machine Learning Repository. 2019. https:\/\/doi.org\/10.24432\/C5D60P.","DOI":"10.24432\/C5D60P"},{"key":"3467_CR41","doi-asserted-by":"publisher","unstructured":"Tianqi C, Carlos G. Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. 2016. p. 785\u201394. https:\/\/doi.org\/10.1145\/2939672.2939785.","DOI":"10.1145\/2939672.2939785"},{"key":"3467_CR42","doi-asserted-by":"publisher","unstructured":"Shalaginov A. Evolutionary optimization of on-line multilayer perceptron for similarity-based access control. In: 2017 International Joint Conference on Neural Networks (IJCNN). 2017. p. 823\u201330. https:\/\/doi.org\/10.1109\/IJCNN.2017.7965937.","DOI":"10.1109\/IJCNN.2017.7965937"},{"key":"3467_CR43","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s12525-021-00475-2","volume":"31","author":"C Janiesch","year":"2021","unstructured":"Janiesch C, Zschech P, Heinrich K. Machine learning and deep learning. Electron Markets. 2021;31:685\u201395. https:\/\/doi.org\/10.1007\/s12525-021-00475-2.","journal-title":"Electron Markets"},{"key":"3467_CR44","unstructured":"Rec, I. X.800 security architecture for open systems interconnection for ccitt applications. ITU-T (CCITT) Recommendation. 1991."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03467-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03467-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03467-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T15:03:54Z","timestamp":1732547034000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03467-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"references-count":44,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["3467"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03467-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,25]]},"assertion":[{"value":"21 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and \/or Animals"}}],"article-number":"1084"}}