{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:19:11Z","timestamp":1771042751922,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031106835","type":"print"},{"value":"9783031106842","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10684-2_17","type":"book-chapter","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:06Z","timestamp":1657609506000},"page":"303-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["ReLOG: A Unified Framework for\u00a0Relationship-Based Access Control over\u00a0Graph Databases"],"prefix":"10.1007","author":[{"given":"Stanley","family":"Clark","sequence":"first","affiliation":[]},{"given":"Nikolay","family":"Yakovets","sequence":"additional","affiliation":[]},{"given":"George","family":"Fletcher","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Sandhu, R.S., Park, J.: Classifying and comparing attribute-based and relationship-based access control. In: CODASPY, pp. 59\u201370. ACM (2017)","DOI":"10.1145\/3029806.3029828"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Aktoudianakis, E., Crampton, J., Schneider, S.A., Treharne, H., Waller, A.: Policy templates for relationship-based access control. In: PST, pp. 221\u2013228. IEEE (2013)","DOI":"10.1109\/PST.2013.6596057"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bertolissi, C., den Hartog, J., Zannone, N.: Using provenance for secure data fusion in cooperative systems. In: SACMAT, pp. 185\u2013194. ACM (2019)","DOI":"10.1145\/3322431.3325100"},{"key":"17_CR4","series-title":"Synthesis Lectures on Data Management","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01864-0","volume-title":"Querying Graphs","author":"A Bonifati","year":"2018","unstructured":"Bonifati, A., Fletcher, G.H.L., Voigt, H., Yakovets, N.: Querying Graphs. Synthesis Lectures on Data Management, Morgan & Claypool Publishers, San Rafael (2018)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Bruns, G., Fong, P., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: CODASPY, pp. 117\u2013124. ACM (2012)","DOI":"10.1145\/2133601.2133616"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: A language for provenance access control. In: CODASPY, pp. 133\u2013144. ACM (2011)","DOI":"10.1145\/1943513.1943532"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 6:1\u20136:38 (2009)","DOI":"10.1145\/1609956.1609962"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Bijon, K., Sandhu, R.: Extended ReBAC administrative models with cascading revocation and provenance support. In: SACMAT, pp. 161\u2013170. ACM (2016)","DOI":"10.1145\/2914642.2914655"},{"issue":"4","key":"17_CR9","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TDSC.2015.2406705","volume":"13","author":"Y Cheng","year":"2016","unstructured":"Cheng, Y., Park, J., Sandhu, R.S.: An access control model for online social networks using user-to-user relationships. IEEE Trans. Dependable Secur. Comput. 13(4), 424\u2013436 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"17_CR10","unstructured":"Clark, S., Yakovets, N., Fletcher, G., Zannone, N.: A Unified Framework for Relationship-Based Access Control over Graph Databases (2022). https:\/\/gitlab.tue.nl\/stanrogo\/relog-framework\/-\/blob\/main\/Unified_ReBAC_Framework_Full.pdf"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Crampton, J., Sellwood, J.: Path conditions and principal matching: a new approach to access control. In: SACMAT, pp. 187\u2013198. ACM (2014)","DOI":"10.1145\/2613087.2613094"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L., Siahaan, I.S.R.: Relationship-based access control policies and their policy languages. In: SACMAT, pp. 51\u201360. ACM (2011)","DOI":"10.1145\/1998441.1998450"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3389\/fict.2015.00009","volume":"2","author":"SP Kaluvuri","year":"2015","unstructured":"Kaluvuri, S.P., Egner, A.I., den Hartog, J., Zannone, N.: SAFAX - an extensible authorization service for cloud environments. Frontiers ICT 2, 9 (2015)","journal-title":"Frontiers ICT"},{"issue":"2","key":"17_CR14","doi-asserted-by":"publisher","first-page":"e1282","DOI":"10.1002\/widm.1282","volume":"9","author":"J Lobo","year":"2019","unstructured":"Lobo, J.: Relationship-based access control: more than a social network access control model. Wiley Interdiscip. Rev. Data Mining Knowl. Discov. 9(2), e1282 (2019)","journal-title":"Wiley Interdiscip. Rev. Data Mining Knowl. Discov."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Paci, F., Squicciarini, A.C., Zannone, N.: Survey on access control for community-centered collaborative systems. ACM Comput. Surv. 51(1), 6:1\u20136:38 (2018)","DOI":"10.1145\/3146025"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Pasarella, E., Lobo, J.: A datalog framework for modeling relationship-based access control policies. In: SACMAT, pp. 91\u2013102. ACM (2017)","DOI":"10.1145\/3078861.3078871"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Rizvi, S.Z.R., Fong, P.W.L.: Efficient authorization of graph-database queries in an attribute-supporting ReBAC model. ACM Trans. Priv. Secur. 23(4), 18:1\u201318:33 (2020)","DOI":"10.1145\/3401027"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10684-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:09:56Z","timestamp":1657609796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10684-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031106835","9783031106842"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10684-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newark, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cs.iit.edu\/~dbsec2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}