Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

Role-Aware Language Models for Secure and Contextualized Access Control in Organizations

Created by
  • Haebom

Author

Saeed Almheiri, Yerulan Kongrat, Adrian Santosh, Ruslan Tasmukhanov, Josemaria Loza Vera, Muhammad Dehan Al Kautsar, Fajri Koto

Outline

This paper explores role-based access control for large-scale language models (LLMs), which are increasingly deployed in enterprise environments. Existing security mechanisms assume general access permissions and focus on preventing harmful or malicious output, but do not address role-specific access restrictions. This study investigates how fine-tuning LLMs can generate responses that reflect the access permissions associated with various organizational roles. We explore three modeling strategies—a BERT-based classifier, an LLM-based classifier, and role-conditional generation—and evaluate model performance using two datasets: one based on clustering and role-labeling of an existing instruction-tuning corpus, and the other synthetically generated based on realistic role-sensitive enterprise scenarios. We also analyze model performance across various organizational structures and its robustness to prompt insertion, role mismatches, and jailbreak attempts.

Takeaways, Limitations

Takeaways:
A Novel Modeling Strategy for Role-Based Access Control in LLMs in Corporate Environments
Verify the possibility of generating LLM responses that reflect access rights for different roles.
Contributes to improved security through model robustness analysis against prompt insertion, role mismatch, and jailbreak attempts.
Presenting a method for creating synthetic datasets that reflect real-world business scenarios.
Limitations:
Lack of clear information about the size and diversity of the datasets used.
Further verification of applicability in real business environments is needed.
Further analysis is needed on the accuracy and effectiveness of access control for specific roles.
Lack of details on generalized performance assessments across diverse organizational structures.
👍