首页> 外文会议>2013 ASE/IEEE International Conference on Social Computing >Access Control Policy Extraction from Unconstrained Natural Language Text
【24h】

Access Control Policy Extraction from Unconstrained Natural Language Text

机译:从不受约束的自然语言文本中提取访问控制策略

获取原文
获取原文并翻译 | 示例

摘要

While access control mechanisms have existed in computer systems since the 1960s, modern system developers often fail to ensure appropriate mechanisms are implemented within particular systems. Such failures allow for individuals, both benign and malicious, to view and manipulate information that they should not otherwise be able to access. The goal of our research is to help developers improve security by extracting the access control policies implicitly and explicitly defined in natural language project artifacts. Developers can then verify and implement the extracted access control policies within a system. We propose a machine-learning based process to parse existing, unaltered natural language documents, such as requirement or technical specifications to extract the relevant subjects, actions, and resources for an access control policy. To evaluate our approach, we analyzed a public requirements specification. We had a precision of 0.87 with a recall of 0.91 in classifying sentences as access control or not. Through a bootstrapping process utilizing dependency graphs, we correctly identified the subjects, actions, and objects elements of the access control policies with a precision of 0.46 and a recall of 0.54.
机译:尽管自1960年代以来计算机系统中已经存在访问控制机制,但是现代系统开发人员经常无法确保在特定系统中实现适当的机制。此类故障使个人(无论是良性还是恶意)都可以查看和操纵他们原本无法访问的信息。我们研究的目的是通过提取自然语言项目工件中隐式和显式定义的访问控制策略来帮助开发人员提高安全性。然后,开发人员可以在系统中验证和实施提取的访问控制策略。我们提出了一种基于机器学习的流程,用于解析现有的,未更改的自然语言文档,例如要求或技术规范,以提取访问控制策略的相关主题,操作和资源。为了评估我们的方法,我们分析了公共需求规范。在将句子归类为访问控制与否时,我们的精度为0.87,召回率为0.91。通过使用依赖关系图的引导过程,我们可以正确地识别访问控制策略的主题,操作和对象元素,精度为0.46,召回率为0.54。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号