AI/ML-DRIVEN ACCESS POLICY SUGGESTION BASED ON USER ATTRIBUTES AND APPLICATION REQUIREMENTS

Authors

  • Laxmikanth Mukund Sethu Kumar Executive Director, JP Morgan Chase Bank, Lewisville, TX 75067, USA. Author

DOI:

https://doi.org/10.34218/IJCET_16_02_021

Keywords:

Attributes, APSE, Artificial Intelligence, Machine Learning

Abstract

The contextual information proposed in the paper is used to suggest an access policy through a suggestion engine based on attributes along with AI/ML. It integrates machine learning, NLP, as well as blockchain to make security, the auditability, and also the functionality of the procedure better. We demonstrate best result in accuracy and latency in addition to policy alignment for complex enterprise systems.

References

Karimi, L., Abdelhakim, M., & Joshi, J. (2021). Adaptive abac policy learning: A reinforcement learning approach. arXiv preprint arXiv:2105.08587. https://doi.org/10.48550/arXiv.2105.08587

Bamberger, A., & Fernández, M. (2024, June). Automated generation and update of structured ABAC policies. In Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (pp. 31-40). https://doi.org/10.1145/3643650.3658608

Arshad, H., Johansen, C., & Owe, O. (2022). Semantic attribute-based access control: A review on current status and future perspectives. Journal of Systems Architecture, 129, 102625. https://doi.org/10.1016/j.sysarc.2022.102625

Ahsan, M. S., & Pathan, A. S. K. (2025). A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art. IoT, 6(1), 9. https://doi.org/10.3390/iot6010009

Cremonezi, B., Gomes Filho, A. R., Silva, E. F., Nacif, J. A. M., Vieira, A. B., & Nogueira, M. (2022). Improving the attribute retrieval on ABAC using opportunistic caches for fog-based IoT networks. Computer Networks, 213, 109000. https://doi.org/10.1016/j.comnet.2022.109000

Nowrozy, R., Ahmed, K., & Wang, H. (2025). GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute. PloS one, 20(1), e0310553. https://doi.org/10.1371/journal.pone.0310553

Liu, G., Pei, W., Tian, Y., Liu, C., & Li, S. (2021). A novel conflict detection method for ABAC security policies. Journal of Industrial Information Integration, 22, 100200. https://doi.org/10.1016/j.jii.2021.100200

Muniswamy, A., & Rathi, R. (2025). Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things. Applied Artificial Intelligence, 39(1), 2459461. https://doi.org/10.1080/08839514.2025.2459461

Nobi, M. N., Gupta, M., Praharaj, L., Abdelsalam, M., Krishnan, R., & Sandhu, R. (2022). Machine learning in access control: A taxonomy and survey. arXiv preprint arXiv:2207.01739. https://doi.org/10.48550/arXiv.2207.01739

Stocks, M. (2024). IBAC Mathematics and Mechanics: The Case for'Integer Based Access Control'of Data Security in the Age of AI and AI Automation. arXiv preprint arXiv:2410.19021. https://doi.org/10.48550/arXiv.2410.19021.

Downloads

Published

2025-04-22

How to Cite

Laxmikanth Mukund Sethu Kumar. (2025). AI/ML-DRIVEN ACCESS POLICY SUGGESTION BASED ON USER ATTRIBUTES AND APPLICATION REQUIREMENTS. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(2), 304-316. https://doi.org/10.34218/IJCET_16_02_021