{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T14:23:49Z","timestamp":1750515829551},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030369446"},{"type":"electronic","value":"9783030369453"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36945-3_6","type":"book-chapter","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:04:11Z","timestamp":1575918251000},"page":"99-120","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Policy Reconciliation and Migration in Attribute Based Access Control"],"prefix":"10.1007","author":[{"given":"Gunjan","family":"Batra","sequence":"first","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,3]]},"reference":[{"key":"6_CR1","unstructured":"Agrawal, D., Giles, J., Lee, K.W., Lobo, J.: Policy ratification. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 223\u2013232 (2005)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Karjoth, G., Bagga, W., Schunter, M.: Efficient comparison of enterprise privacy policies. In: ACM Symposium on Applied Computing, pp. 375\u2013382 (2004)","DOI":"10.1145\/967900.967983"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: ACM SACMAT, pp. 187\u2013196 (2009)","DOI":"10.1145\/1542207.1542238"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-95729-6_4","volume-title":"Data and Applications Security and Privacy XXXII","author":"G Batra","year":"2018","unstructured":"Batra, G., Atluri, V., Vaidya, J., Sural, S.: Enabling the deployment of ABAC policies in RBAC systems. In: Kerschbaum, F., Paraboschi, S. (eds.) DBSec 2018. LNCS, vol. 10980, pp. 51\u201368. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-95729-6_4"},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM TISSEC 6(1), 71\u2013127 (2003)","journal-title":"ACM TISSEC"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P Bonatti","year":"2002","unstructured":"Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM TISSEC 5(1), 1\u201335 (2002)","journal-title":"ACM TISSEC"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bruns, G., Dantas, D.S., Huth, M.: A simple and expressive semantic framework for policy composition in access control. In: Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering, pp. 12\u201321. ACM (2007)","DOI":"10.1145\/1314436.1314439"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: International Conference on Software Engineering, pp. 196\u2013205 (2005)","DOI":"10.1145\/1062455.1062502"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-30144-8_19","volume-title":"Information Security","author":"DP Guelev","year":"2004","unstructured":"Guelev, D.P., Ryan, M., Schobbens, P.Y.: Model-checking access control policies. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 219\u2013230. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-30144-8_19"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Hu, V.: Attribute based access control (ABAC) definition and considerations. Technical report, National Institute of Standards and Technology (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1145\/253262.253364","volume":"26","author":"S Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V., Bertino, E.: A unified framework for enforcing multiple access control policies. ACM SIGMOD Rec. 26, 474\u2013485 (1997)","journal-title":"ACM SIGMOD Rec."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: On the specification and evolution of access control policies. In: ACM SACMAT, pp. 121\u2013130 (2001)","DOI":"10.1145\/373256.373280"},{"issue":"9","key":"6_CR13","first-page":"1946","volume":"25","author":"D Lin","year":"2013","unstructured":"Lin, D., Rao, P., Ferrini, R., Bertino, E., Lobo, J.: A similarity measure for comparing XACML policies. IEEE TKDE 25(9), 1946\u20131959 (2013)","journal-title":"IEEE TKDE"},{"issue":"6","key":"6_CR14","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"EC Lupu","year":"1999","unstructured":"Lupu, E.C., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng. 25(6), 852\u2013869 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Mazzoleni, P., Bertino, E., Crispo, B., Sivasubramanian, S.: XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, pp. 219\u2013227. ACM (2006)","DOI":"10.1145\/1133058.1133089"},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/1178618.1178620","volume":"9","author":"P McDaniel","year":"2006","unstructured":"McDaniel, P., Prakash, A.: Methods and limitations of security policy reconciliation. ACM TISSEC 9(3), 259\u2013291 (2006)","journal-title":"ACM TISSEC"},{"issue":"11","key":"6_CR17","first-page":"1557","volume":"17","author":"B Shafiq","year":"2005","unstructured":"Shafiq, B., Joshi, J.B., Bertino, E., Ghafoor, A.: Secure interoperation in a multidomain environment employing RBAC policies. IEEE TKDE 17(11), 1557\u20131577 (2005)","journal-title":"IEEE TKDE"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Talukdar, T., Batra, G., Vaidya, J., Atluri, V., Sural, S.: Efficient bottom-up mining of attribute based access control policies. In: IEEE International Conference on Collaboration and Internet Computing, pp. 339\u2013348 (2017)","DOI":"10.1109\/CIC.2017.00051"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-662-46666-7_7","volume-title":"Principles of Security and Trust","author":"F Turkmen","year":"2015","unstructured":"Turkmen, F., den Hartog, J., Ranise, S., Zannone, N.: Analysis of XACML policies with SMT. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 115\u2013134. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46666-7_7"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-25645-0_13","volume-title":"Network and System Security","author":"J Vaidya","year":"2015","unstructured":"Vaidya, J., Shafiq, B., Atluri, V., Lorenzi, D.: A framework for policy similarity evaluation and migration based on change detection. Network and System Security. LNCS, vol. 9408, pp. 191\u2013205. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-25645-0_13"},{"issue":"5","key":"6_CR21","first-page":"533","volume":"12","author":"Z Xu","year":"2015","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies. IEEE TDSC 12(5), 533\u2013545 (2015)","journal-title":"IEEE TDSC"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36945-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:10:46Z","timestamp":1575918646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36945-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030369446","9783030369453"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36945-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.idrbt.ac.in\/ICISS-2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}