{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:35:56Z","timestamp":1769844956864,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018696","name":"Health","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018696","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018696","name":"Health","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018696","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018696","name":"Health","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018696","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018696","name":"Health","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018696","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130033","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"983-989","source":"Crossref","is-referenced-by-count":1,"title":["An Explainable Method for Access Control Policies Classification"],"prefix":"10.1109","author":[{"given":"Luca","family":"Petrillo","sequence":"first","affiliation":[{"name":"IMT School for Advanced Studies Lucca,Lucca,Italy"}]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[{"name":"Institute for High Performance Computing and Networking,National Research Council of Italy (CNR),Rende (CS),Italy"}]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[{"name":"University of Molise,Campobasso,Italy"}]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[{"name":"University of Molise,Campobasso,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45608-2_3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IECON51785.2023.10312150"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2024.108255"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08608-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68639-9_8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2024.107452"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2023.4.1299"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0019-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2840738"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3744746"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/fi17010015"},{"key":"ref12","article-title":"Leveraging pre-trained 1 lms for gdpr compliance in online privacy policies","author":"Ciaramella","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13204057"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIUCC58832.2023.10278387"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMC60390.2024.00008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-024-45563-x"},{"key":"ref17","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv preprint arXiv:1810.04805"},{"key":"ref18","article-title":"Electra: Pretraining text encoders as discriminators rather than generators","author":"Clark","year":"2020","journal-title":"arXiv preprint arXiv:2003.10555"},{"key":"ref19","article-title":"Roberta: A robustly optimized bert pretraining approach","volume":"364","author":"Liu","year":"2019","journal-title":"arXiv preprint arXiv:1907.11692"},{"issue":"140","key":"ref20","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"Journal of machine learning research"},{"key":"ref21","article-title":"The falcon series of open language models","author":"Almazrouei","year":"2023","journal-title":"arXiv preprint arXiv:2311.16867"},{"key":"ref22","article-title":"Llama 2: Open foundation and fine-tuned chat models","author":"Touvron","year":"2023","journal-title":"arXiv preprint arXiv:2307.09288"},{"key":"ref23","article-title":"Mixtral of experts","author":"Jiang","year":"2024","journal-title":"arXiv preprint arXiv:2401.04088"},{"key":"ref24","article-title":"Qwen2 technical report","volume-title":"arXiv preprint arXiv:2407.10671","author":"Yang","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3327163"},{"key":"ref26","article-title":"A unified approach to interpreting model predictions","author":"Lundberg","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664280"},{"key":"ref28","article-title":"Appendix b: itrust electronic health care system case study","volume-title":"Software and Systems Traceability","volume":"425","author":"Meneely","year":"2012"},{"key":"ref29","article-title":"Course registration requirements","volume-title":"IBM","year":"2024"},{"key":"ref30","article-title":"Cyberchair: A web-based groupware application to facilitate the paper reviewing process","author":"Van De Stadt","year":"2012","journal-title":"arXiv preprint arXiv:1206.1833"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393608"},{"key":"ref32","article-title":"Lora: Low-rank adaptation of large language models","author":"Hu","year":"2021","journal-title":"arXiv preprint arXiv:2106.09685"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-019-6413-7"},{"key":"ref34","article-title":"Fine-tuned\u2019small\u2019llms (still) significantly outperform zero-shot generative ai models in text classification","author":"Bucher","year":"2024","journal-title":"arXiv preprint arXiv:2406.08660"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.68"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2818708"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM55620.2022.9995559"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130033.pdf?arnumber=11130033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:54:20Z","timestamp":1756270460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130033","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}