{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:19:53Z","timestamp":1774973993217,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF CREST Grant","award":["HRD1736209"],"award-info":[{"award-number":["HRD1736209"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447828","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"197-207","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Formal Analysis of ReBAC Policy Mining Feasibility"],"prefix":"10.1145","author":[{"given":"Shuvra","family":"Chakraborty","sequence":"first","affiliation":[{"name":"The University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[{"name":"The University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2016.47"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029828"},{"key":"e_1_3_2_2_3_1","volume-title":"Relationship-Based Access Control: Its Expression and Enforcement through Hybrid Logic (CODASPY '12)","author":"Bruns Glenn","unstructured":"Glenn Bruns , Philip W.L. Fong , Ida Siahaan , and Michael Huth . 2012. Relationship-Based Access Control: Its Expression and Enforcement through Hybrid Logic (CODASPY '12) . Association for Computing Machinery , New York, NY, USA , 117--124. Glenn Bruns, Philip W.L. Fong, Ida Siahaan, and Michael Huth. 2012. Relationship-Based Access Control: Its Expression and Enforcement through Hybrid Logic (CODASPY '12). Association for Computing Machinery, New York, NY, USA, 117--124."},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 25th ACM Symposium on Access Control Models and Technologies","author":"Bui Thang","unstructured":"Thang Bui and Scott D. Stoller . 2020. A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies . In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies ( Barcelona, Spain) (SACMAT '20). Association for Computing Machinery, New York, NY, USA, 167--178. Thang Bui and Scott D. Stoller. 2020. A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (Barcelona, Spain) (SACMAT '20). Association for Computing Machinery, New York, NY, USA, 167--178."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325106"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078878"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.011"},{"key":"e_1_3_2_2_8_1","volume-title":"Foundations and Practice of Security, Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, and Joaquin Garcia-Alfaro (Eds.)","author":"Bui Thang","unstructured":"Thang Bui , Scott D. Stoller , and Jiajie Li . 2019 c. Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data . In Foundations and Practice of Security, Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, and Joaquin Garcia-Alfaro (Eds.) . Springer International Publishing , Cham , 267--284. Thang Bui, Scott D. Stoller, and Jiajie Li. 2019 c. Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. In Foundations and Practice of Security, Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, and Joaquin Garcia-Alfaro (Eds.). Springer International Publishing, Cham, 267--284."},{"key":"e_1_3_2_2_9_1","volume-title":"On the Feasibility of Attribute-Based Access Control Policy Mining. In 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI). 245--252","author":"Chakraborty Shuvra","year":"2019","unstructured":"Shuvra Chakraborty , Ravi Sandhu , and Ram Krishnan . 2019 . On the Feasibility of Attribute-Based Access Control Policy Mining. In 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI). 245--252 . Shuvra Chakraborty, Ravi Sandhu, and Ram Krishnan. 2019. On the Feasibility of Attribute-Based Access Control Policy Mining. In 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI). 245--252."},{"key":"e_1_3_2_2_10_1","volume-title":"Secure Knowledge Management In Artificial Intelligence Era","author":"Chakraborty Shuvra","unstructured":"Shuvra Chakraborty , Ravi Sandhu , and Ram Krishnan . 2020. On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis . In Secure Knowledge Management In Artificial Intelligence Era . Springer Singapore , Singapore , 147--163. Shuvra Chakraborty, Ravi Sandhu, and Ram Krishnan. 2020. On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. In Secure Knowledge Management In Artificial Intelligence Era. Springer Singapore, Singapore, 147--163."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Y. Cheng J. Park and R. Sandhu. 2012. Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. In 2012 International Conference on Privacy Security Risk and Trust and 2012 International Confernece on Social Computing. 646--655.  Y. Cheng J. Park and R. Sandhu. 2012. Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. In 2012 International Conference on Privacy Security Risk and Trust and 2012 International Confernece on Social Computing. 646--655.","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"e_1_3_2_2_12_1","volume-title":"Data and Applications Security and Privacy XXVI\"","author":"Cheng Yuan","unstructured":"Yuan Cheng , Jaehong Park , and Ravi Sandhu . 2012. A User-to-User Relationship-Based Access Control Model for Online Social Networks . In Data and Applications Security and Privacy XXVI\" . Springer Berlin Heidelberg , Berlin, Heidelberg , 8--24. Yuan Cheng, Jaehong Park, and Ravi Sandhu. 2012. A User-to-User Relationship-Based Access Control Model for Online Social Networks. In Data and Applications Security and Privacy XXVI\". Springer Berlin Heidelberg, Berlin, Heidelberg, 8--24."},{"key":"e_1_3_2_2_13_1","volume-title":"Data and Applications Security and Privacy XXVIII,, Vijay Atluri and G\u00fcnther Pernul (Eds.)","author":"Cheng Yuan","unstructured":"Yuan Cheng , Jaehong Park , and Ravi Sandhu . 2014. Attribute-Aware Relationship-Based Access Control for Online Social Networks . In Data and Applications Security and Privacy XXVIII,, Vijay Atluri and G\u00fcnther Pernul (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 292--306. Yuan Cheng, Jaehong Park, and Ravi Sandhu. 2014. Attribute-Aware Relationship-Based Access Control for Online Social Networks. In Data and Applications Security and Privacy XXVIII,, Vijay Atluri and G\u00fcnther Pernul (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 292--306."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 16th ACM Symposium on Access Control Models and Technologies","author":"Philip","unstructured":"Philip W.L. Fong and Ida Siahaan. 2011. Relationship-Based Access Control Policies and Their Policy Languages . In Proceedings of the 16th ACM Symposium on Access Control Models and Technologies ( Innsbruck, Austria) (SACMAT '11). Association for Computing Machinery, New York, NY, USA, 51--60. Philip W.L. Fong and Ida Siahaan. 2011. Relationship-Based Access Control Policies and Their Policy Languages. In Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (Innsbruck, Austria) (SACMAT '11). Association for Computing Machinery, New York, NY, USA, 51--60."},{"key":"e_1_3_2_2_17_1","first-page":"162","article-title":"Guide to attribute based access control (ABAC) definition and considerations","volume":"800","author":"Hu Vincent C","year":"2014","unstructured":"Vincent C Hu 2014 . Guide to attribute based access control (ABAC) definition and considerations . NIST Special Publication , Vol. 800 (2014), 162 . Vincent C Hu et almbox. 2014. Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication, Vol. 800 (2014), 162.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325419"},{"key":"e_1_3_2_2_19_1","volume-title":"Security Analysis of Relationship-Based Access Control Policies (CODASPY '18)","author":"Masoumzadeh Amirreza","unstructured":"Amirreza Masoumzadeh . 2018. Security Analysis of Relationship-Based Access Control Policies (CODASPY '18) . Association for Computing Machinery , New York, NY, USA , 186--195. Amirreza Masoumzadeh. 2018. Security Analysis of Relationship-Based Access Control Policies (CODASPY '18). Association for Computing Machinery, New York, NY, USA, 186--195."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447828","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":19,"alternative-id":["10.1145\/3422337.3447828","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447828","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}