{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:57:41Z","timestamp":1726070261677},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811538162"},{"type":"electronic","value":"9789811538179"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3817-9_8","type":"book-chapter","created":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T10:03:36Z","timestamp":1583402616000},"page":"126-146","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of Unified Access Control Policies"],"prefix":"10.1007","author":[{"given":"Mahendra Pratap","family":"Singh","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.cose.2019.06.001","volume":"86","author":"MP Singh","year":"2019","unstructured":"Singh, M.P., Sural, S., Vaidya, J., Atluri, V.: Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. Comput. Secur. 86, 183\u2013205 (2019)","journal-title":"Comput. Secur."},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-25645-0_15","volume-title":"Network and System Security","author":"MP Singh","year":"2015","unstructured":"Singh, M.P., Sural, S., Atluri, V., Vaidya, J., Yakub, U.: Managing multi-dimensional multi-granular security policies using data warehousing. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) NSS 2015. LNCS, vol. 9408, pp. 221\u2013235. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-25645-0_15"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Hu, V.C., et al.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, J.E., Feinstein, H.L., Youman, C.E.: Role based access control models. IEEE Comput. 29, 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-01004-0_10","volume-title":"Transactions on Computational Science IV","author":"S Aich","year":"2009","unstructured":"Aich, S., Mondal, S., Sural, S., Majumdar, A.K.: Role based access control with spatiotemporal context for mobile applications. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 177\u2013199. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01004-0_10"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Andrea, B.P., Ferrari, E.: TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 191\u2013233 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 2, 105\u2013135 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Mondal, S., Sural, S., Atluri, V.: Towards formal security analysis of GTRBAC using timed automata. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 33\u201342 (2009)","DOI":"10.1145\/1542207.1542214"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.cose.2013.07.005","volume":"39","author":"M Sharma","year":"2013","unstructured":"Sharma, M., Sural, S., Vaidya, J., Atluri, V.: AMTRAC: an administrative model for temporal role-based access control. Comput. Secur. 39, 201\u2013218 (2013)","journal-title":"Comput. Secur."},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-642-45204-8_28","volume-title":"Information Systems Security","author":"M Sharma","year":"2013","unstructured":"Sharma, M., Sural, S., Atluri, V., Vaidya, J.: An administrative model for spatio-temporal role based access control. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 375\u2013389. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-45204-8_28"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: Reachability analysis for role based administration of attributes. In: Proceedings of the 2013 ACM Workshop on Digital Identity Management, pp. 73\u201384 (2013)","DOI":"10.1145\/2517881.2517891"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"NL Ninghui","year":"2006","unstructured":"Ninghui, N.L., Tripunitara, M.V.: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9, 391\u2013420 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Mondal, S., Sural, S.: Security analysis of temporal-RBAC using timed automata. In: Proceedings of the 4th International Conference on Information Assurance and Security, pp. 37\u201340 (2008)","DOI":"10.1109\/IAS.2008.10"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.cose.2014.08.001","volume":"46","author":"S Jha","year":"2014","unstructured":"Jha, S., Sural, S., Vaidya, J., Atluri, V.: Security analysis of temporal RBAC under an administrative model. Comput. Secur. 46, 154\u2013172 (2014)","journal-title":"Comput. Secur."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Atluri, V.: A meta model for access control: why is it needed and is it even possible to achieve? In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 153\u2013154 (2008)","DOI":"10.1145\/1377836.1377860"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-13841-1_8","volume-title":"Information Systems Security","author":"S Jha","year":"2014","unstructured":"Jha, S., Sural, S., Vaidya, J., Atluri, V.: Temporal RBAC security analysis using logic programming in the presence of administrative policies. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 129\u2013148. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-13841-1_8"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Jha, S., Sural, S., Atluri, V., Vaidya, J.: An administrative model for collaborative management of ABAC systems and its security analysis. In: Proceedings of the 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, pp. 64\u201373 (2016)","DOI":"10.1109\/CIC.2016.022"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Uzun, E., Atluri, V., Sural, S., Madhusudan, P.: Analyzing temporal role-based access control models. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 177\u2013186 (2012)","DOI":"10.1145\/2295136.2295169"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1049\/iet-ifs.2018.5010","volume":"13","author":"S Jha","year":"2018","unstructured":"Jha, S., Sural, S., Vaidya, J., Atluri, V.: Security analysis of ABAC under an administrative model. IET Inf. Secur. 13, 96\u2013103 (2018)","journal-title":"IET Inf. Secur."},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-22906-5_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"QM Rajpoot","year":"2015","unstructured":"Rajpoot, Q.M., Jensen, C.D., Krishnan, R.: Attributes enhanced role-based access control model. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 3\u201317. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-22906-5_1"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-22110-1_36","volume-title":"Computer Aided Verification","author":"K Hoder","year":"2011","unstructured":"Hoder, K., Bj\u00f8rner, N., de Moura, L.: $${\\mu }Z$$\u2013 an efficient engine for fixed points with constraints. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 457\u2013462. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-22110-1_36"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L Moura de","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-78800-3_24"}],"container-title":["Communications in Computer and Information Science","Secure Knowledge Management In Artificial Intelligence Era"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3817-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T10:17:39Z","timestamp":1583403459000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3817-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811538162","9789811538179"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3817-9_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SKM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference On Secure Knowledge Management In Artificial Intelligence Era","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pilani","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"skm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.secure-km.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.68","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}