{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T02:40:09Z","timestamp":1748572809204,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319224244"},{"type":"electronic","value":"9783319224251"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22425-1_19","type":"book-chapter","created":{"date-parts":[[2015,8,19]],"date-time":"2015-08-19T14:42:31Z","timestamp":1439995351000},"page":"316-334","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data"],"prefix":"10.1007","author":[{"given":"Tong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yazhe","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,20]]},"reference":[{"key":"19_CR1","unstructured":"OASIS, eXtensible Access Control Markup Language (XACML). http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"19_CR2","unstructured":"Kolovsk, V., Hendler, J., et al.: Formalizing xacml using defeasible description logics. Technical Report TR-233-11, University of Maryland, USA (2006)"},{"key":"19_CR3","unstructured":"Sun\u2019s XACML implementation (2005). http:\/\/sunxacml.sourceforge.net"},{"key":"19_CR4","unstructured":"Enterprise XACML (2012). http:\/\/code.google.com\/p\/enterprise-java-xacml\/"},{"issue":"12","key":"19_CR5","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/TC.2010.274","volume":"60","author":"AX Liu","year":"2011","unstructured":"Liu, A.X., et al.: Designing fast and scalable XACML policy evaluation engines. IEEE Trans. Comput. 60(12), 1802\u20131817 (2011)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"19_CR6","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TSC.2010.28","volume":"4","author":"S Marouf","year":"2011","unstructured":"Marouf, S., et al.: Adaptive reordering and clustering-based framework for efficient XACML policy evaluation. IEEE Trans. Serv. Comput. 4(4), 300\u2013313 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"9","key":"19_CR7","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1109\/TKDE.2012.174","volume":"25","author":"D Lin","year":"2013","unstructured":"Lin, D., et al.: A similarity measure for comparing XACML policies. IEEE Trans. Knowl. Data Eng. 25(9), 1946\u20131959 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Sculley, D.: Web-scale K-Means clustering. In: Proceedings of the 19th International Conference on World Wide Web (WWW 2010). ACM (2010)","DOI":"10.1145\/1772690.1772862"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Griffin, L., et al.: On the performance of access control policy evaluation. In: IEEE International Symposium on Policies for Distributed Systems and Networks (2012)","DOI":"10.1109\/POLICY.2012.15"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Fisler, K., et al.: Verification and change-impact analysis of access-control policies. In: Proceedings of the 27th International Conference on Software Engineering. ACM (2005)","DOI":"10.1145\/1062455.1062502"},{"key":"19_CR11","unstructured":"Halpern, J.Y., et al.: Using first-order logic to reason about policies. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW 2003) (2003)"},{"issue":"2","key":"19_CR12","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/TPDS.2013.147","volume":"25","author":"W Han","year":"2014","unstructured":"Han, W., et al.: Collaborative policy administration. IEEE Trans. Parallel Distrib. Syst. 25(2), 498\u2013507 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"19_CR13","unstructured":"Philip, W.L., et al.: A white-box policy analysis and its efficient implementation. In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies (2013)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Lerner, R.M.: At the forge: Redis. Linux J. 197 (2010)","DOI":"10.1192\/bjp.197.5.371"},{"key":"19_CR15","unstructured":"Node.js: Evented IO for V8 javascript. https:\/\/github.com\/joyent\/node"},{"key":"19_CR16","unstructured":"Crockford, D.: JSON: the fat free alternative to XML. In: 15th International World wide Web conference (WWW 2006). ACM (2006)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Yuan, E., et al.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2005) (2005)","DOI":"10.1109\/ICWS.2005.25"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Special Publication 800-162 (2013)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Ahn, G.-J., et al. Representing and reasoning about web access control policies. In: IEEE 34th Annual Computer Software and Applications Conference (2010)","DOI":"10.1109\/COMPSAC.2010.20"},{"issue":"2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"3336","DOI":"10.1016\/j.eswa.2008.01.039","volume":"36","author":"HS Park","year":"2009","unstructured":"Park, H.S., et al.: A simple and fast algorithm for K-medoids clustering. Expert Syst. Appl. 36(2), 3336\u20133341 (2009)","journal-title":"Expert Syst. Appl."},{"key":"19_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316801","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","author":"L Kaufman","year":"1990","unstructured":"Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, New York (1990)"},{"key":"19_CR22","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.knosys.2012.10.012","volume":"39","author":"R Zadegan","year":"2013","unstructured":"Zadegan, R., et al.: Ranked k-medoids: A fast and accurate rank-based partitioning algorithm for clustering large datasets. Knowl.-Based Syst. 39, 133\u2013143 (2013)","journal-title":"Knowl.-Based Syst."},{"issue":"4","key":"19_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1023\/A:1016308404627","volume":"6","author":"J Grabmeier","year":"2002","unstructured":"Grabmeier, J., Rudolph, A.: Techniques of cluster algorithms in data mining. Data Mining Knowl. Disc. 6(4), 303\u2013360 (2002)","journal-title":"Data Mining Knowl. Disc."},{"key":"19_CR24","volume-title":"Geographic Data Mining and Knowledge Discovery","author":"J Han","year":"2001","unstructured":"Han, J., et al.: Spatial clustering methods in data mining: a survey. In: Miller, H.J., Han, J. (eds.) Geographic Data Mining and Knowledge Discovery. Taylor & Francis, London (2001)"},{"key":"19_CR25","unstructured":"Kamvar, K., et al.: Spectral learning. In: International Joint Conference of Artificial Intelligence. Stanford InfoLab (2003)"},{"issue":"6","key":"19_CR26","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/TDSC.2013.18","volume":"10","author":"H Hu","year":"2013","unstructured":"Hu, H., Ahn, G.J., et al.: Discovery and resolution of anomalies in web access control policies. IEEE Trans. Dependable Secure Comput. (TDSC) 10(6), 341\u2013354 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput. (TDSC)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Lin, D., et al.: Policy decomposition for collaborative access control. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (2008)","DOI":"10.1145\/1377836.1377853"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Rao, P., et al.: An algebra for fine-grained integration of XACML policies. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (2009)","DOI":"10.1145\/1542207.1542218"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Borders, K., et al.: CPOL: high-performance policy evaluation. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005) (2005)","DOI":"10.1145\/1102120.1102142"},{"key":"19_CR30","unstructured":"Durham, D., et al.: The COPS (common open policy service) protocol (2000)"},{"issue":"1","key":"19_CR31","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1330295.1330299","volume":"11","author":"P Mazzoleni","year":"2008","unstructured":"Mazzoleni, P., et al.: XACML policy integration algorithms. ACM Trans. Inf. Syst. Secur. (TISSEC) 11(1), 4 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Li, N., et al.: Access control policy combining: theory meets practice. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (2009)","DOI":"10.1145\/1542207.1542229"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Karjoth, G., et al.: Implementing ACL-based policies in XACML. In: Proceedings of Annual Computer Security Applications Conference (ACSAC 2008) (2008)","DOI":"10.1109\/ACSAC.2008.31"},{"issue":"9","key":"19_CR34","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40\u201348 (1994)","journal-title":"IEEE Commun. Mag."},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Moore, B., Ellesson, E., Strassner, J., et al.: Policy core information model-version 1 specification. RFC 3060, February 2001","DOI":"10.17487\/rfc3060"},{"key":"19_CR36","doi-asserted-by":"crossref","unstructured":"Ngo, C., et al.: Multi-data-types interval decision diagrams for XACML evaluation engine. In: Proceedings of 11th Annual International Conference on Privacy, Security and Trust PST 2013) (2013)","DOI":"10.1109\/PST.2013.6596061"},{"key":"19_CR37","unstructured":"Dom4J Group: Dom4J API Project. http:\/\/www.dom4j.org\/"},{"key":"19_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-86718-7","volume-title":"First-Order Logic","author":"RM Smullyan","year":"1968","unstructured":"Smullyan, R.M.: First-Order Logic, vol. 6. Springer, Heidelberg (1968)"},{"issue":"6","key":"19_CR39","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10009-008-0087-9","volume":"10","author":"G Hughes","year":"2008","unstructured":"Hughes, G., et al.: Automated verification of access control policies using a SAT solver. Int. J. Softw. Tools Technol. Transfer 10(6), 503\u2013520 (2008)","journal-title":"Int. J. Softw. Tools Technol. Transfer"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22425-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T02:20:06Z","timestamp":1748571606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22425-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319224244","9783319224251"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22425-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}