AI/ML-DRIVEN ACCESS POLICY SUGGESTION BASED ON USER ATTRIBUTES AND APPLICATION REQUIREMENTS
DOI:
https://doi.org/10.34218/IJCET_16_02_021Keywords:
Attributes, APSE, Artificial Intelligence, Machine LearningAbstract
The contextual information proposed in the paper is used to suggest an access policy through a suggestion engine based on attributes along with AI/ML. It integrates machine learning, NLP, as well as blockchain to make security, the auditability, and also the functionality of the procedure better. We demonstrate best result in accuracy and latency in addition to policy alignment for complex enterprise systems.
References
Karimi, L., Abdelhakim, M., & Joshi, J. (2021). Adaptive abac policy learning: A reinforcement learning approach. arXiv preprint arXiv:2105.08587. https://doi.org/10.48550/arXiv.2105.08587
Bamberger, A., & Fernández, M. (2024, June). Automated generation and update of structured ABAC policies. In Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (pp. 31-40). https://doi.org/10.1145/3643650.3658608
Arshad, H., Johansen, C., & Owe, O. (2022). Semantic attribute-based access control: A review on current status and future perspectives. Journal of Systems Architecture, 129, 102625. https://doi.org/10.1016/j.sysarc.2022.102625
Ahsan, M. S., & Pathan, A. S. K. (2025). A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art. IoT, 6(1), 9. https://doi.org/10.3390/iot6010009
Cremonezi, B., Gomes Filho, A. R., Silva, E. F., Nacif, J. A. M., Vieira, A. B., & Nogueira, M. (2022). Improving the attribute retrieval on ABAC using opportunistic caches for fog-based IoT networks. Computer Networks, 213, 109000. https://doi.org/10.1016/j.comnet.2022.109000
Nowrozy, R., Ahmed, K., & Wang, H. (2025). GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute. PloS one, 20(1), e0310553. https://doi.org/10.1371/journal.pone.0310553
Liu, G., Pei, W., Tian, Y., Liu, C., & Li, S. (2021). A novel conflict detection method for ABAC security policies. Journal of Industrial Information Integration, 22, 100200. https://doi.org/10.1016/j.jii.2021.100200
Muniswamy, A., & Rathi, R. (2025). Trust-Based Consensus and ABAC for Blockchain Using Deep Learning to Secure Internet of Things. Applied Artificial Intelligence, 39(1), 2459461. https://doi.org/10.1080/08839514.2025.2459461
Nobi, M. N., Gupta, M., Praharaj, L., Abdelsalam, M., Krishnan, R., & Sandhu, R. (2022). Machine learning in access control: A taxonomy and survey. arXiv preprint arXiv:2207.01739. https://doi.org/10.48550/arXiv.2207.01739
Stocks, M. (2024). IBAC Mathematics and Mechanics: The Case for'Integer Based Access Control'of Data Security in the Age of AI and AI Automation. arXiv preprint arXiv:2410.19021. https://doi.org/10.48550/arXiv.2410.19021.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Laxmikanth Mukund Sethu Kumar (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.