<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>Machine Learning in Access Control: A Taxonomy</title></titleStmt>
			<publicationStmt>
				<publisher>ACM</publisher>
				<date>07/08/2025</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10611596</idno>
					<idno type="doi"></idno>
					
					<author>MOHAMMAD NOBI</author><author>Ram Krishnan</author><author>Maanak Gupta</author><author>Shohel Rana</author><author>Lopamudra Praharaj</author><author>Mahmoud Abdelsalam</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[Developing and managing access control systems is challenging due to the dynamic nature of users, resources, and environments. Recent advancements in machine learning (ML) offer promising solutions for automating the extraction of access control attributes, policy mining, verification, and decision-making. Despite these advancements, the application of ML in access control remains fragmented, resulting in an incomplete understanding of best practices. This work aims to systematize the use of ML in access control by identifying key components where ML can address various access control challenges. We propose a novel taxonomy of ML applications within this domain, highlighting current limitations such as the scarcity of public real-world datasets, the complexities of administering ML-based systems, and the opacity of ML model decisions. Additionally, we outline potential future research directions to guide both new and experienced researchers in effectively integrating ML into access control practices.
CCS CONCEPTS• Security and privacy → Access control; • Computing methodologies → Machine learning.]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">INTRODUCTION</head><p>Researchers have shown significant interest in applying machine learning (ML) to various aspects of access control, such as policy mining, verification, monitoring, and administration. Although still in its infancy, ML applications in access control are evolving with the goal of replacing language-based security policies with trained ML agents. Figure <ref type="figure">1</ref> provides an overview of access control systems and their pipelines. Traditional systems involve roles, attributes, policy engineering, verification, and administration, while ML-based systems replace security policies with trained ML agents, which involve training, verification, and administration of the agent <ref type="bibr">[79]</ref>. Optional components are indicated by dashed boxes in Figure <ref type="figure">1</ref>.</p><p>ML has proven highly successful in solving complex problems across various domains, outperforming manual human-driven processes. In access control, manual solutions often fail to achieve optimal performance and may grant unauthorized access. Consequently, there are significant opportunities for improvement in access control. Researchers have leveraged ML to develop more efficient solutions, such as providing decisions for unseen access scenarios <ref type="bibr">[98]</ref>, automating laborious tasks like attribute extraction from natural language <ref type="bibr">[3-5, 46, 75]</ref>, mapping roles and permissions <ref type="bibr">[78,</ref><ref type="bibr">101]</ref>, extracting security rules from access logs <ref type="bibr">[30,</ref><ref type="bibr">60,</ref><ref type="bibr">73]</ref>, and deriving access control policies from user stories <ref type="bibr">[46]</ref>. ML has also been used for access policy verification <ref type="bibr">[47,</ref><ref type="bibr">49]</ref> and monitoring suspicious activities <ref type="bibr">[96]</ref>. Additionally, researchers have proposed using ML for access control decision-making, where trained models determine whether access requests should be granted or denied <ref type="bibr">[22,</ref><ref type="bibr">25,</ref><ref type="bibr">59,</ref><ref type="bibr">67,</ref><ref type="bibr">79]</ref>.</p><p>Evidently, the rapid emergence and utilization of ML has shown a significant potential in improving and reshaping the field of access control. However, several challenges need to be addressed. A major obstacle is that researchers tend to apply ML methods on a case-bycase basis <ref type="bibr">[4,</ref><ref type="bibr">15,</ref><ref type="bibr">30,</ref><ref type="bibr">39,</ref><ref type="bibr">61,</ref><ref type="bibr">96]</ref>, and thereby, there is no common strategy for using ML in the access control domain. This leads to a lack of in-depth insights and the absence of a holistic view of the application of ML in access control. In addition, there is a lack of research efforts that address the best strategy to determine the most effective ML technique given a particular access control problem. Another limitation pertains to the availability of data. There is a noticeable lack of quality datasets from the real-world organization <ref type="bibr">[37,</ref><ref type="bibr">47]</ref>. Even though some public datasets are available, they are typically anonymized datasets which, in most cases, exclude relevant information necessary for expressing a complete access control state of the system <ref type="bibr">[74]</ref>. Considering all the aforementioned limitations, it is essential to have a holistic view of the utilization of machine learning for access control, which, in turn, will help to shed light on the underdeveloped areas and determine the future directions in the domain.</p><p>In this paper, we perform a detailed review and summarize existing literature that uses ML to solve different access control problems. To the best of our knowledge, this is the first comprehensive work that offers an encyclopedic view towards outlining the application of machine learning for access control. Our systematization makes the following contributions.</p><p>&#8226; We comprehensively review existing access control literature that uses machine learning and discuss various research works done in different sub-domains of access control. &#8226; We propose a novel taxonomy of machine learning in access control, and highlight research at each stage as the domain has evolved chronologically. &#8226; We summarize the publicly available real-world datasets used for machine learning based access control research.</p><p>&#8226; We highlight open challenges and limitations faced by the research community, as well as provide future research directions to thrive in this critical security domain.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">ML IN ACCESS CONTROL TAXONOMY AND SCOPE</head><p>This paper dives into the exciting world of machine learning in the access control pipeline. We've crafted an abstract taxonomy to showcase the intricate relationships among various components and building blocks of access control research, helping to organize our work, as illustrated in Figure <ref type="figure">2</ref>. We've categorized the available work into two major areas: ML Assisted Access Control' and ML Based Access Control'. The first category includes innovative literature that enhances traditional policy or role-based access control processes, such as attribute engineering, policy mining/extraction, role/permission assignments, and policy verification. Overall, those methods mostly deal with processes in ABAC, RBAC, ReBAC. The second category is even more groundbreaking, featuring articles that replace traditional access control policies with an ML model. In this scenario, the model itself acts as the policy, making access decisions autonomously.</p><p>Throughout the paper, we explain each of the branches of this figure, intending to solve some of the key questions as follows. These questions are answered in Section 3 and 4 for each work discussed, as well as summarized per-subdomain in Tables <ref type="table">1</ref><ref type="table">2</ref><ref type="table">3</ref><ref type="table">4</ref><ref type="table">5</ref>.</p><p>(1) What are the target access control models? In particular, is the proposed ML approach applicable for the access control domain as a whole or only suitable for any particular model? (2) What are the ML methods that the respective approach uses? (3) Why does the respective approach use ML, and to what extent ML method contribute? (4) What are the input and output of the ML model? Can the trained machine learning model make access control decisions, or does the corresponding method only use ML to improve or automate access control sub-processes? (5) What kind of data was used for training the ML algorithm?</p><p>We also explore any possible enhancements related to ML in access control, such as adversarial attack, explainability, bias, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Corpus Collection</head><p>This systematization is based on published research from 2006 to the end of 2024. Before 2006, no ML-based access control solutions were found. We reviewed papers from various sources, including Google Scholar, ACM Digital Library, IEEEXplore, Springer, and preprints from arXiv.</p><p>We chose to read individual papers rather than rely on keyword searches in databases, as this approach ensured no relevant articles were overlooked. The terminology used to describe ML practices in access control is highly varied due to the field's nascent nature. Consequently, keyword searches might have excluded significant literature. By manually reading and selecting papers, we compiled a comprehensive and contextually relevant collection for our study.</p><p>We also summarized datasets used in these studies to provide an overview of available datasets, their applications, and limitations. All publicly available datasets are summarized in Table <ref type="table">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Timeline</head><p>We present the timeline of seminal works using ML for access control in Figure <ref type="figure">3</ref>. We sort the timeline according to the published year and illustrate how the application of ML evolved in the access control domain. As summarized in Figure <ref type="figure">3</ref>, ML in access control is fairly new introducing its concept first in 2006. However, the application of ML in access control domain is emerging fast, and researchers published most of the work in recent years.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">ML ASSISTED ACCESS CONTROL</head><p>This section provides an overview of literature that leverages machine learning to address issues related to traditional access control models. In these studies, machine learning isn't used to directly predict access decisions. Instead, it optimizes various processes such as policy mining, role mining, and rule mining.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Policy Mining</head><p>High-level access control models like ABAC and ReBAC are favored for their flexible policies and reduced management burdens, supporting dynamic and complex security policies. However, transitioning from lower-level policies like ACLs is challenging. Policy mining techniques use user and resource attributes, their values, and the system's current access control state as input. For ABAC and ReBAC, algorithms generate rules that grant the same permissions <ref type="bibr">[18,</ref><ref type="bibr">20]</ref>. In contrast, RBAC mining algorithms produce permission-to-role (PA) and user-to-role (UA) assignments <ref type="bibr">[78,</ref><ref type="bibr">101]</ref>. Table <ref type="table">2</ref> reports access control policy mining approaches using ML.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.1">Attribute Based Access Control (ABAC).</head><p>Attributes and Policy Extraction from Natural Language. Natural language policies, being the preferred expression of policy <ref type="bibr">[3]</ref>, need to be transformed into a machine-readable form. Several researchers attempted to process such policies to extract access control-related information, including identifying policy sentences, triples of subject-object-action, etc. While manual extraction of such information is inefficient as the task becomes repetitive, requires more time, and is error-prone, several other approaches have been proposed to automate the process <ref type="bibr">[75,</ref><ref type="bibr">76,</ref><ref type="bibr">87,</ref><ref type="bibr">88,</ref><ref type="bibr">97]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ML in Access Control</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ML Assisted Access Control</head><p>Attribute and Policy Engineering ABAC Attributes and Policy Extraction from Natural Language <ref type="bibr">[3-5, 46, 75]</ref> Policy Extraction from Logs <ref type="bibr">[30,</ref><ref type="bibr">56,</ref><ref type="bibr">60,</ref><ref type="bibr">61,</ref><ref type="bibr">73]</ref> Policy Optimization <ref type="bibr">[10,</ref><ref type="bibr">37]</ref> RBAC Role Mining <ref type="bibr">[39,</ref><ref type="bibr">46]</ref> Role/Permission Assignments <ref type="bibr">[78,</ref><ref type="bibr">101]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ReBAC</head><p>ReBAC Policy Mining <ref type="bibr">[15]</ref><ref type="bibr">[16]</ref><ref type="bibr">[17]</ref> Policy Verification and Testing <ref type="bibr">[47,</ref><ref type="bibr">49]</ref> Policy Administration <ref type="bibr">[2,</ref><ref type="bibr">7,</ref><ref type="bibr">8,</ref><ref type="bibr">44]</ref> Policy Monitoring <ref type="bibr">[69,</ref><ref type="bibr">96]</ref> ML Based Access Control</p><p>Access Decision <ref type="bibr">[22,</ref><ref type="bibr">25,</ref><ref type="bibr">28,</ref><ref type="bibr">59,</ref><ref type="bibr">63,</ref><ref type="bibr">67,</ref><ref type="bibr">79,</ref><ref type="bibr">82,</ref><ref type="bibr">90]</ref> Security and Administration <ref type="bibr">[80,</ref><ref type="bibr">81]</ref> Figure <ref type="figure">2</ref>: A Taxonomy of Machine Learning in Access Control Domain.</p><p>Narouei et al. <ref type="bibr">[75]</ref> (2017) present a framework for ABAC that extracts security policies from natural language documents using deep recurrent neural networks (RNN). The model identifies access control policy content from high-level requirement documents, achieving a 5.58% improvement over other methods. However, human involvement is needed to accurately identify ACP sentences. Alohaly et al. <ref type="bibr">[3]</ref> propose a deep learning framework using NLP, RE, and CNN to automate ABAC attribute extraction from NL policies. The framework identifies policy elements, extracts attribute values, and determines their categories, achieving an F1 score of 0.96 for subject attributes and 0.91 for object attributes. The evaluation uses datasets like iTrust <ref type="bibr">[71]</ref>, IBM Course Management App <ref type="bibr">[1]</ref>, CyberChair <ref type="bibr">[95]</ref>, and Collected ACP <ref type="bibr">[97]</ref>. However, it lacks support for hierarchical ABAC systems. Alohaly et al. <ref type="bibr">[5]</ref> enhance their previous framework <ref type="bibr">[3]</ref> to automatically extract attributes from NL hierarchical ABAC policies using NLP and ML techniques. The multi-phase framework achieves an average F1 score of 0.96 for subject attributes and 0.91 for object attributes, evaluated on datasets like iTrust <ref type="bibr">[71]</ref>, IBM Course Management App <ref type="bibr">[1]</ref>, CyberChair <ref type="bibr">[95]</ref>, and Collected ACP <ref type="bibr">[97]</ref>.</p><p>Alohaly et al. <ref type="bibr">[4]</ref> propose an automated process for extracting constraints in ABAC policies using NLP tools. The method uses BiLSTM models to identify and label conflicting factors in policy sentences, achieving an F1 score of 0.91 and detecting at least 75% of each constraint expression. The evaluation dataset includes 801 constraints in 747 NLACP sentences from various departments <ref type="bibr">[4,</ref><ref type="bibr">12,</ref><ref type="bibr">13,</ref><ref type="bibr">51]</ref>. Heaps et al. <ref type="bibr">[46]</ref> developed a transformers-based deep learning model to extract access control information from user stories, including access control classification, named entity recognition, and access type classification <ref type="bibr">[36]</ref>. Evaluated on the Dalpiaz dataset <ref type="bibr">[32,</ref><ref type="bibr">33]</ref>, the model outperformed CNN and SVM, though CNN performed comparably in named entity recognition. The authors recommend a larger dataset for further improvement.</p><p>Policy Extraction from Logs. Mining ABAC policies from legacy systems is inefficient and laborious, making alternative sources beneficial. Additionally, maintaining these rules is challenging.</p><p>A straightforward approach is to mine ABAC rules from access logs <ref type="bibr">[98]</ref>, as they reflect the existing access control policy.</p><p>Mocanu et al. <ref type="bibr">[73]</ref> propose a deep learning approach using Restricted Boltzmann Machines (RBMs) to infer policies from logs, supporting negative authorization. The two-phase method generates candidate rules from logs and transforms them for comparison with Xu-Stoller <ref type="bibr">[98]</ref>. Evaluated on a healthcare dataset, the approach shows promise but requires further implementation and evaluation for diverse real-world policies. Cotrini et al. <ref type="bibr">[30]</ref> propose Rhapsody, an approach for mining ABAC rules from sparse access logs, addressing issues like rule size and over-permissiveness. Rhapsody modifies APRIORI-SD <ref type="bibr">[62]</ref> to generate concise rules, evaluated on Amazon access logs <ref type="bibr">[58,</ref><ref type="bibr">93]</ref> and ETH Zurich lab logs. Using universal cross-validation, Rhapsody achieves higher F1 scores and better generalization compared to Classification Tree <ref type="bibr">[14]</ref>, CN2 <ref type="bibr">[29]</ref>, and other ABAC mining algorithms <ref type="bibr">[62,</ref><ref type="bibr">98]</ref>.</p><p>Jabal et al. <ref type="bibr">[56]</ref> introduce Polisma, a framework for learning ABAC policies using data mining, statistical, and ML techniques. Polisma generates, generalizes, and augments rules with restriction rules, then applies Random Forest (RF) and KNN classifiers to handle uncovered requests. Evaluated on real-world <ref type="bibr">[93]</ref> and synthetic datasets, Polisma effectively develops accurate ABAC policies. Karimi et al. <ref type="bibr">[60]</ref> propose an ABAC policy extraction method using access logs, building on their previous unsupervised learning approach <ref type="bibr">[61]</ref>. The method uses K-modes clustering <ref type="bibr">[21]</ref> to generate rules with positive and negative filters, followed by rule pruning and refinement. Evaluated on real-world and synthetic datasets, the approach effectively handles incomplete logs and noise but requires careful tuning of parameters for optimal performance. Policy Optimization. Benkaouz et al. <ref type="bibr">[10]</ref> propose using KNN algorithms for clustering and classifying ABAC policies, enhancing flexibility and reducing dimensionality in high-scale systems. The granularity of ABAC policies is adjusted by the parameter k, with smaller values for fine-grained models and larger values for coarsegrained models. This approach is still under development, with open Time-constraint access control model (TCAC) <ref type="bibr">[25]</ref> TCAC SVM Identifying discrepancies between policy specification and its functionalities <ref type="bibr">[69]</ref> Common Prisom Approximating the user-permission assignments <ref type="bibr">[39]</ref>   questions about the default value of k, the best KNN algorithms for clustering, and its applicability to various applications.</p><p>El Hadj et al. <ref type="bibr">[37]</ref> propose ABAC-PC, a method for clustering ABAC policy rules based on decision effects and similarity scores, producing minimal representative rules. Extending Benkaouz et al. <ref type="bibr">[10]</ref>, the approach can reduce policy rules by up to 10% for policies with over 9000 rules and can be integrated with other tools to detect and resolve anomalies in XACML policies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.2">Role Based Access Control (RBAC).</head><p>Role Mining. Frank et al. <ref type="bibr">[39]</ref> focus on bottom-up RBAC role mining to approximate user-permission assignments by finding minimal sets of roles, user-role, and role-permission assignments. They propose a probabilistic framework to address errors and nonmeaningful roles in combinatorial algorithms, generalizing observations from existing user-permission assignments.</p><p>In another work, the authors use Gibbs sampler <ref type="bibr">[77]</ref> for their Disjoint Decomposition Model, evaluated on synthetic and real-world datasets. The synthetic dataset includes 200 users, 200 permissions, ten business roles, and five technical roles, while the real-world dataset has 5000 users and 1323 permissions. The approach creates meaningful roles and identifies erroneous user-permission assignments, though it uniformly introduces errors in the synthetic dataset, unlike the unknown error count in real-world scenarios.</p><p>Role/Permission Assignments. Role-based provisioning is a standard in Identity Management products, but struggles in dynamic enterprises where frequent application reconfiguration and new service deployment are common. Adjusting role mappings to new privileges is challenging and costly, highlighting the need to reduce role maintenance efforts.</p><p>Ni et al. <ref type="bibr">[78]</ref> propose a machine learning-based automated role maintenance system to provision existing roles with entitlements from new applications and new users with existing roles. The technique involves four phases: collecting role-entitlement mappings, filtering essential attributes, pre-processing data, and training classifiers. Evaluated on real-world and synthetic data, SVM was chosen as the final classifier, achieving FP rates between 0-5% and FN rates between 0-30%, with 70% of assignments automated and 30% needing assistance. Lu Zhou et al. <ref type="bibr">[101]</ref> propose two ML-based approaches for automating role assignment in SCADA systems. They first apply SVM using static and dynamic attributes of users and devices for role assignments, but do not provide detailed evaluation results. They then experiment with the Adaboost algorithm using the same inputs, comparing real and discrete-valued Adaboost algorithms on a SCADA intrusion detection dataset <ref type="bibr">[92]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.3">Relationship Based Access Control (ReBAC).</head><p>Like ABAC policy mining approaches, ReBAC policy mining algorithms can also potentially reduce the effort to obtain a high-level policy from lower-level access control data.</p><p>Bui et al. <ref type="bibr">[15]</ref> propose an efficient ReBAC policy mining algorithm, enhancing their previous evolutionary algorithm <ref type="bibr">[20]</ref> with a neural network-based feature selection phase. This reduces search space and improves authorization mapping. Evaluated on realworld <ref type="bibr">[34,</ref><ref type="bibr">35]</ref> and synthetic policies, the enhanced algorithm is faster and more effective. Bui et al. <ref type="bibr">[16]</ref> propose DTRM and DTRM -, decision tree-based algorithms for mining ReBAC policies. DTRM mines ORAL policies, while DTRM -supports negative conditions and constraints. Evaluated on real-world <ref type="bibr">[34,</ref><ref type="bibr">35]</ref> and synthetic datasets <ref type="bibr">[20]</ref>, they produce smaller, faster policies than state-of-theart methods <ref type="bibr">[15,</ref><ref type="bibr">55]</ref>.</p><p>In most real-world data, information about permissions can be incomplete, or some attribute values can be missing (or unknown). Authors in <ref type="bibr">[19,</ref><ref type="bibr">30,</ref><ref type="bibr">54,</ref><ref type="bibr">65]</ref> solved different variants of the ABAC and ReBAC policy mining problem considering incomplete permissions information. However, all these works assume the attribute (and relationship in the case of ReBAC) information is complete (or known). The authors in <ref type="bibr">[17]</ref> introduced DTRMU -and DTRMU algorithms for mining ABAC and ReBAC policies from ACLs, addressing incomplete information using Kleene's three-valued logic. This approach assigns a third truth value, 'U,' to unknown conditions, alongside true (T) and false (F) values. They developed a multi-way decision tree algorithm to classify authorization requests and generate ReBAC rules from labeled feature vectors <ref type="bibr">[15,</ref><ref type="bibr">16]</ref>. Experiments were conducted with sample policies from Bui et al. <ref type="bibr">[20]</ref> and case studies from Decat et al. <ref type="bibr">[34,</ref><ref type="bibr">35]</ref>, comparing the performance of mined rules to simplified original rules.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Policy Verification and Testing</head><p>Traditional policy verification methods are error-prone and timeconsuming, lacking specificity in roles or permissions. They struggle with code-policy relations and new mappings. XACML-based policies also require rigorous verification to ensure accuracy and compliance.</p><p>Martin et al. <ref type="bibr">[69]</ref> showed that ML algorithms can summarize policy properties and identify bug-exposing requests, revealing discrepancies between policy specifications and functionalities. Access requests are generated and applied to the system, with observations structured as request-response pairs. These pairs are used by an ML algorithm to infer policy properties and identify potential bugs. The authors integrated Sun's XACML implementation <ref type="bibr">[83]</ref> and Weka <ref type="bibr">[52]</ref> into their tool, which handles request generation, evaluation, and policy property inference. Using the Prism classification algorithm <ref type="bibr">[23]</ref>, the tool was tested on a university's grades repository policy <ref type="bibr">[38]</ref>. Results showed that inferred properties effectively summarize the policy and identify bug-exposing requests.</p><p>Heaps et al. <ref type="bibr">[47]</ref> propose leveraging deep learning to develop a more robust and efficient system. They suggest training a deep learning model based on links between code and policy elements. Since code elements lack numerical meaning, they use the Skipgram Word2Vec algorithm <ref type="bibr">[72]</ref> to embed code elements into a highdimensional space. Experiments with JDK8 and Apache Shiro showed that this technique produces high-quality word embeddings and delivers state-of-the-art performance.</p><p>Access control policies are verified using model proof, data structure, system simulation, and test oracles. Comprehensive test case generation is challenging, so the NIST report <ref type="bibr">[49]</ref> proposed a machine learning technique for efficient verification. This method trains a model based on policy rule attributes to generate a classification model, predicting access permissions and detecting inconsistencies. The authors used random forest (RF) as the ML method, encoding policy rules in a data table where each column represents an attribute, action, or permission, and each row represents a policy Event Logs Event log from an incident management process <ref type="bibr">[22]</ref> rule. Rules with multiple actions or object attributes are split into sub-rules. The RF model is evaluated to detect permission conflicts and ensure it recognizes policy rule semantics, including condition, separation of duty, and exclusion properties. The accuracy function analysis indicates the semantic correctness of the policy. Less than 100% correctness suggests conflict rules may exist. Overall, the algorithm efficiently verifies policies and detects inconsistencies. Table <ref type="table">3</ref> summarizes access control policy verification tools and methods using machine learning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Policy Administration</head><p>Adapting access control policies to tackle cyber attacks is challenging due to their static nature. Regular maintenance is required to keep policies up-to-date, which, if not automated, is laborious and error-prone <ref type="bibr">[7]</ref>. Erroneous policies can make the system vulnerable to adversaries or misuse by internal users. Therefore, reinforcing the access control system to identify misconfigurations and adjust policies accordingly is crucial.</p><p>Manual access control policy updates are laborious and errorprone <ref type="bibr">[7]</ref>, making systems vulnerable to cyber attacks. Authors in <ref type="bibr">[7]</ref> present ML-AC, an ML-based approach that updates policies automatically at run-time to prevent such threats. ML-AC monitors user access behavioral features (e.g., frequency, data amount, location) and adjusts access control rules based on contextual knowledge. This method includes a Contextual Behaviour Learning component in the Policy Administration Point (PAP) to build user profiles and adjust policies. ML-AC uses RF to classify access control behavior as normal or anomalous and refines policies by encoding ML-rules with learned contextual knowledge. It also monitors user behavior evolution using Olindda <ref type="bibr">[89]</ref> to detect new clusters. Experiments with a synthetic dataset demonstrated ML-AC's effectiveness. Comparisons with BBNAC <ref type="bibr">[40]</ref> and ML-AC &#119899;&#119900;&#119896; (without contextual knowledge) showed ML-AC's superior performance.</p><p>Alkhresheh et al. <ref type="bibr">[2]</ref> proposed an adaptive access control policy framework for IoT, refining policies based on device behaviors. They suggest a policy management module for adaptation, including behavior classification and policy refinement, alongside the traditional ABAC server. Both servers include a context monitor. Using RF and LSTM <ref type="bibr">[48]</ref> on three years of access data from a university's door locking system, they found LSTM outperformed RF with larger datasets due to its ability to learn from longer sequences. The study concluded that LSTM scales better in IoT environments.</p><p>Gumma et al. <ref type="bibr">[44]</ref> proposed PAMMELA, an ML-based ABAC policy administration method that creates new rules and extends existing policies. It operates in two phases: training an ML classifier on ABAC policy rules and generating rules based on access requests. The authors experimented with three datasets containing various  <ref type="bibr">[42]</ref>, Gradient Boosting (GB) <ref type="bibr">[41]</ref>, and Extreme Gradient Boosting (XGB) <ref type="bibr">[26]</ref>. The study provided insights into managing ABAC policies using PAMMELA.</p><p>Recently, Ayedh et al. <ref type="bibr">[8]</ref> introduced an enhanced and distributed access control decision-making model that utilizes a random forest   <ref type="table">4</ref> outlines related methods proposed for the access control administration using machine learning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Policy Monitoring and Auditing</head><p>Regular access control policy updates are challenging and errorprone <ref type="bibr">[96]</ref>, risking severe security incidents. Xiang et al. <ref type="bibr">[96]</ref> developed P-DIFF to help system admins monitor policy changes and investigate malicious access by backtracking related changes. They proposed a Time-Changing Decision Tree (TCDT) to handle timeseries information, modeling access control behavior over time. P-DIFF uses access logs to generate a TCDT, aiding policy change validation and forensics analysis. Experiments with datasets from five real-world systems, including Wikipedia <ref type="bibr">[94]</ref>, showed P-DIFF detects 86 to 100% of policy changes with 89% precision and 85 to 98% efficacy in forensic analysis. Table <ref type="table">4</ref> further outlines this work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">ML-BASED ACCESS CONTROL (MLBAC)</head><p>Recent research highlights the benefits of using ML models for accurate access control decision-making <ref type="bibr">[22,</ref><ref type="bibr">25,</ref><ref type="bibr">59,</ref><ref type="bibr">67,</ref><ref type="bibr">79,</ref><ref type="bibr">90]</ref>. These systems use trained ML models instead of language-based policies to decide access (grant or deny) based on user and resource metadata and attributes. Metadata and attributes are features that the ML model learns for subsequent access decisions. Besides, it is required to administer those trained ML models such that any changes in access policy can be accommodated <ref type="bibr">[80]</ref>, while securing them from external attack <ref type="bibr">[81]</ref>. We briefly discuss these approaches below and summarize them in Table <ref type="table">5</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Access Decision</head><p>Access control policies sometimes need to be restricted by access hours. For example, a user may be denied access outside office hours. Chang et al. <ref type="bibr">[25]</ref> proposed a time-constraint access control system using SVM, divided into three phases: input pattern transforming, training SVMs, and authority decision. They implemented SVMs using LIBSVM <ref type="bibr">[24]</ref>, training on users' login times and passwords to classify users and grant access based on these factors. The system uses trained SVMs for access decisions instead of traditional policies.</p><p>Performance evaluation with training data showed the system can authenticate users' access rights, demonstrating its practicality.</p><p>Centralized access control architectures with static policies are limited in IoT due to devices' computational constraints. Outsourcing access control management introduces security and privacy concerns. IoT needs a framework suitable for its distributed nature, allowing user privacy control and centralized handling. Outchakoucht et al. <ref type="bibr">[82]</ref> proposed a blockchain and ML-based access control approach for IoT. The approach uses blockchain for distributed policy management and ML, specifically Reinforcement Learning, to dynamically adjust access control policies as resources are accessed and security policies executed.</p><p>Cappelletti et al. <ref type="bibr">[22]</ref> explored symbolic (DT, RF) and non-symbolic (SVC, MLP) ML techniques for inferring ABAC policies from access logs. They used two Amazon datasets <ref type="bibr">[58,</ref><ref type="bibr">93]</ref> and the Incident dataset <ref type="bibr">[6]</ref>, noting the sparsity and imbalance of Amazon datasets versus the balanced Incident dataset. PCA and t-SNE <ref type="bibr">[99]</ref> revealed well-separated clusters in the Incident log but not in the Amazon dataset. Amazon datasets showed around 50% accuracy due to sparsity, while Incident logs had high accuracy. MLP excelled with sparse data, capturing complex relationships. Symbolic techniques offered better decision understanding, highlighting concerns about black-box ML techniques' explainability and verifiability. Khilar et al. <ref type="bibr">[63]</ref> proposed a trust-based cloud resource access approach using user access history and behavior, considering bogus, unauthorized, and forbidden requests. They tested ML techniques like KNN, decision tree, logistic regression, naive Bayes, neural networks, and ensemble algorithms. The ensemble model of random forest (RF) and K-nearest neighbor performed best, with neural networks achieving the highest performance.</p><p>Srivastava et al. <ref type="bibr">[90]</ref> proposed RAdAC, a framework assessing requester genuineness, calculating risk, and acting accordingly, using attributes like access time, location, request frequency, and resource sensitivity. They developed a Hospital Management System prototype and tested a neural network and RF algorithm. RF performed best with both input data and engineered parameters, highlighting the need for domain expertise to determine optimal values. Liu et al. <ref type="bibr">[67]</ref> proposed EPDE-ML, an Efficient Permission Decision Engine scheme based on ML to improve the ABAC model's policy decision point (PDP). EPDE-ML uses an RF algorithm trained on user attributes and prior access control information to permit or  <ref type="bibr">[68]</ref> Not specified To enhance the trustworthiness of MLBAC systems MLBAC Machine Unlearning RW <ref type="bibr">(1.8)</ref> deny access requests. The process is split into two phases: Phase 1 uses the trained model for decisions, and Phase 2 updates the model with current policy information. Experiments on Amazon's access control policy set <ref type="bibr">[58]</ref> showed EPDE-ML's superior performance, with an AUC of 0.975 and 92.6% accuracy. Decision time remained consistent at around 0.115 seconds, regardless of policy size.</p><p>Karimi et al. <ref type="bibr">[59]</ref> proposed an adaptive access control approach using RL to address challenges like limited labeled data and sparse logs. The goal is to develop an adaptive ABAC policy learning model for smart home IoT environments, with methods to speed up learning based on attribute value hierarchy. Experiments on synthesized and real datasets, including Amazon <ref type="bibr">[58]</ref>, showed the effectiveness of the approach. The real dataset included employee access requests, indicating whether access was permitted, along with attribute values and resource identifiers.</p><p>Traditional access control systems struggle in dynamic, largescale environments, making it difficult for human administrators to maintain accurate access control states. Nobi et al. <ref type="bibr">[79]</ref> propose Deep Learning Based Access Control (DLBAC), which uses user and resource metadata directly, eliminating the need for attribute and policy engineering. The DLBAC model, based on ResNet <ref type="bibr">[45]</ref>, outputs a trained neural network for access control decisions. The authors developed a DLBAC prototype, tested it with eight synthetic datasets and two Amazon datasets <ref type="bibr">[58,</ref><ref type="bibr">93]</ref>, and found that DLBAC makes more accurate and generalized access control decisions than traditional systems. DLBAC better balances over-provision (unauthorized access) and under-provision (denied access) inefficiencies compared to policy-based systems. However, DLBAC may inherit biases from training data, potentially leading to adverse decisions.</p><p>For example, in the Amazon dataset, where most authorization tuples involve grant decisions, DLBAC might favor similar decisions. Ensuring fair decisions requires auditing the training data and evaluating decisions for fairness.</p><p>Chhetri et al. <ref type="bibr">[28]</ref> introduce an environment-aware access control model that leverages deep learning to integrate contextual environmental data in security decision-making. By analyzing realtime conditions and adapting policies accordingly, the model enhances precision in identifying legitimate access requests while strengthening overall system resilience in dynamic settings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Administration and Security</head><p>Nobi et al. <ref type="bibr">[80]</ref> investigate the administration challenges of MLbased access control systems, particularly in capturing changes in access control states. They compare the performance of symbolic (RF) and non-symbolic (ResNet) ML methods in a simulated environment. The study highlights the advantages and disadvantages of both approaches, such as insufficient learning of new changes and forgetting existing access information. Experimental results indicate that non-symbolic methods outperform symbolic ones in adapting to incremental changes in access control states. Recently, Llamas et al. <ref type="bibr">[68]</ref> introduced a certified unlearning framework for ML-based access control, ensuring compliance with evolving policies by removing specific data without full retraining. This enhances adaptability, security, and privacy in access control systems.</p><p>While deploying an ML model for access decision, it is crucial to secure the model from unwanted intervene. Nobi et al. <ref type="bibr">[81]</ref> examine the security vulnerabilities of ML-based access control systems, particularly their susceptibility to adversarial attacks. It highlights how minor input modifications can lead to incorrect access decisions by ML models. The study focuses on manipulating user and resource information to gain unauthorized access, using ResNet models in simulated environments. Results show that adversarial attacks can be designed for these models, but access control-specific constraints can mitigate such attacks to some extent.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">OPEN CHALLENGES AND FUTURE RESEARCH DIRECTIONS 5.1 Understanding Access Control Decisions</head><p>In complex situations where access control systems overlap, nonsymbolic ML models often make better decisions than traditional policies or symbolic ML models <ref type="bibr">[22]</ref>. Neural networks and other non-symbolic methods can learn subtle differences among users, resources, and their relationships. However, achieving superior performance with these models often comes at the cost of explainability-understanding the reasons behind specific access decisions.</p><p>While ML models for access control are still in their early stages, a lack of explainability could hinder their growth. Written policies and symbolic ML models offer straightforward explanations through human-understandable logical rules. For example, symbolic ML methods allow easy extraction of logical rules from decision trees. In contrast, non-symbolic ML models, such as DLBAC <ref type="bibr">[79]</ref> or Karimi et al. <ref type="bibr">[59]</ref>, use 'black box' functions that are not easily interpretable, which is crucial for security-sensitive domains.</p><p>As shown in Figure <ref type="figure">4</ref>, moving from written policies to nonsymbolic approaches increases performance but decreases explainability. This limitation affects other domains, including computer vision, malware analysis, and financial systems. The issue of explainability is a very active research area in ML <ref type="bibr">[53]</ref>. Solutions are often domain-specific; for example, a method for explaining computer vision models may not work for access control.</p><p>Nobi et al. <ref type="bibr">[79]</ref> addressed this issue in access control by proposing two methods for explaining neural network-based decisions in human terms. However, these methods do not guarantee 100% accuracy in understanding decisions. Therefore, there is significant potential for further research to improve explanations and enhance intuition in this area.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Access Control Administration</head><p>Maintaining access control systems, whether traditional or MLbased, is crucial for long-term security. This involves modifying policy configurations or attributes to accommodate authorization changes. RBAC tasks include managing permissions, roles, and hierarchies <ref type="bibr">[11,</ref><ref type="bibr">84,</ref><ref type="bibr">86]</ref>. ABAC involves adjusting attributes and rules <ref type="bibr">[57,</ref><ref type="bibr">85]</ref>, while ReBAC requires managing relationships and policies <ref type="bibr">[27,</ref><ref type="bibr">91]</ref>. These issues are well-studied in traditional models.</p><p>ML-based access control introduces new challenges, such as updating ML models and access information. Nobi et al. <ref type="bibr">[80]</ref> defined administration requirements for ML-based systems and proposed updating methods. Further investigation is needed to address remaining challenges.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Adversarial Attacks</head><p>Adversarial attacks are a common concern for ML-based systems. An adversary can obtain unwarranted decisions <ref type="bibr">[9]</ref> by fooling the network with adversarial samples indistinguishable from natural ones <ref type="bibr">[100]</ref>. In ML-based access control, adversarial attacks can force systems to grant unauthorized access. Attackers can trick the system by providing manipulated user and resource information. Additionally, attribute-hiding attacks may occur, where attackers hide or remove portions of their information to secure access. Nobi et al. <ref type="bibr">[81]</ref> explored this issue, demonstrating that access to ML models creates potential for adversarial attacks. They showed that such attacks can be mitigated using access control-specific constraints, but their work is limited to scenarios where attackers cannot access the deployed ML model. No other methods addressing adversarial issues in access control were found.</p><p>Therefore, it is crucial to investigate adversarial attacks more thoroughly from an access control perspective and develop solutions to protect systems against these vulnerabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4">Lack of 'Good' Datasets</head><p>Ground truth information is crucial for evaluating access control applications like role mining and policy mining, especially for MLbased methods <ref type="bibr">[74]</ref>. However, few high-quality datasets are available, and existing ones are often imbalanced <ref type="bibr">[30,</ref><ref type="bibr">79]</ref> and lack sufficient information <ref type="bibr">[46]</ref>. This makes designing effective systems challenging. Researchers address this by using data preprocessing <ref type="bibr">[67]</ref>, data augmentation <ref type="bibr">[3,</ref><ref type="bibr">4,</ref><ref type="bibr">101]</ref>, and synthetic datasets <ref type="bibr">[98]</ref>. A hybrid approach combining real-world and synthetic datasets is also common <ref type="bibr">[17,</ref><ref type="bibr">56,</ref><ref type="bibr">60,</ref><ref type="bibr">79]</ref>.</p><p>Despite the rise in ML applications for access control, the lack of quality datasets from real-world organizations remains a significant obstacle. Many datasets are anonymous or incomplete and lack the necessary semantics and granularity <ref type="bibr">[74]</ref>. High-quality datasets are essential for advancing ML-based access control.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.5">Bias and Fairness</head><p>In access control, an ML model is over-provisioned if it is biased toward granting unauthorized access. Conversely, it is under-provisioned if it denies desired access. Both can be measured quantitatively as high FPR and low TPR, respectively <ref type="bibr">[79]</ref>. These biases often arise from imbalanced training data or improper ML model design.</p><p>For example, the Amazon dataset <ref type="bibr">[58]</ref> contains two years of historical access data, where employees were manually allowed or denied access to resources. The data is highly imbalanced, with over 90% of requests granted access <ref type="bibr">[30,</ref><ref type="bibr">79]</ref>. This disproportionate training data biases the model towards granting access <ref type="bibr">[79]</ref>. Bias can also result from poor ML model/algorithm design. Therefore, understanding the characteristics of training data and ML algorithms is crucial for developing a fair and reliable system <ref type="bibr">[70]</ref>. Additionally, besides evaluating access control decisions, it is important to assess fairness performance and establish a feedback loop <ref type="bibr">[31,</ref><ref type="bibr">79]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.6">Insufficient Tools for Verification</head><p>A reliable system design is ensured through rigorous testing and verification. Testing evaluates a system under various conditions to observe behavior and detect errors, while verification ensures the system does not misbehave under general circumstances <ref type="bibr">[43]</ref>. In access control, policies are verified and tested similarly to software functionality <ref type="bibr">[50]</ref>. Ensuring correct access control decisions is complex and requires significant effort. Failure to verify the system's correctness can lead to serious consequences, such as overprovision, under-provision, and adversarial attacks. This area is well-studied for traditional access control systems, with established verification methods <ref type="bibr">[49,</ref><ref type="bibr">64]</ref>.</p><p>When ML is applied, performance is measured using unseen data to test model correctness. However, this method cannot identify all possible misclassifications, and the impact of misclassification varies across domains. For example, granting unauthorized access can be more costly than denying legitimate access in access control. Therefore, comprehensive verification is crucial before deploying ML-assisted access control systems. While there are methods to verify ML models automatically <ref type="bibr">[66]</ref>, each has its pros and cons. Further research is needed to design a systematic verification and testing framework for ML and access control.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">SUMMARY</head><p>This work comprehensively explores the exciting intersection of access control and machine learning. We propose a taxonomy of machine learning for access control and discuss each approach within this framework. Our findings reveal that machine learning is making significant strides in various areas of access control, including attribute engineering, policy mining, and access control policy verification. We also examine efforts to use trained machine learning models to make access control decisions, replacing traditional written policies. These models offer robust and generalized decisionmaking, though they often lack transparency in how decisions are made. Additionally, we outline publicly available real-world datasets used in machine learning-based access control research.</p><p>Finally, we share our observations and vision regarding open challenges in the domain, providing potential guidelines to overcome them. This work aims to shed light on the promising future of machine learning in access control and inspire further research and innovation.</p></div><note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0"><p>Conference'17, July 2017, Washington, DC, USA Anon.</p></note>
		</body>
		</text>
</TEI>
