{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T01:26:12Z","timestamp":1772155572461,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cnsm.2013.6727843","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T18:39:14Z","timestamp":1391193554000},"page":"243-250","source":"Crossref","is-referenced-by-count":2,"title":["Refactoring multi-layered access control policies through (De)composition"],"prefix":"10.1109","author":[{"given":"Matteo Maria","family":"Casalino","sequence":"first","affiliation":[]},{"given":"Romuald","family":"Thion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"195","DOI":"10.3233\/IDA-2000-43-403","article-title":"Discovery of multivalued dependencies from relations","volume":"4","author":"savnik","year":"2000","journal-title":"Intell Data Anal"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01883-1","author":"bertossi","year":"2011","journal-title":"Database Repairing and Consistent Query Answering"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1093382.1093385"},{"key":"15","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3233\/JCS-2007-15202","article-title":"A theory for comparing the expressive power of access control models","volume":"15","author":"tripunitara","year":"2007","journal-title":"J Comput Secur"},{"key":"16","first-page":"372","article-title":"Formal definition and comparison of access control models","volume":"4","author":"habib","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691331"},{"key":"14","first-page":"1","article-title":"Policy refinement decomposition and operationalization for dynamic domains","author":"craven","year":"2011","journal-title":"CNSM"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990681"},{"key":"12","doi-asserted-by":"crossref","first-page":"2981","DOI":"10.1016\/j.comcom.2008.04.018","article-title":"The policy continuumpolicy authoring and conflict analysis","volume":"31","author":"davy","year":"2008","journal-title":"Computer Communications"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/320557.320571"},{"key":"2","first-page":"14","article-title":"Security automation research challenges and future directions","volume":"14","author":"al-shaer","year":"2011","journal-title":"IAnewsletter"},{"key":"1","year":"2010","journal-title":"Uk Security Breach Investigations Report 2010"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"7","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1145\/1533057.1533097","article-title":"D-algebra for composing access control policy decisions","author":"ni","year":"2009","journal-title":"ASIACCS '09 Proceedings of the 4th International Symposium on Information Computer and Communications Security"},{"key":"6","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1952982.1952991","article-title":"Access control via belnap logic intuitive, expressive, and analyzable policy composition","volume":"14","author":"bruns","year":"2011","journal-title":"ACM Trans Inf Syst Secur"},{"key":"5","first-page":"205","article-title":"The logic of xacml","author":"ramli","year":"2011","journal-title":"FACS"},{"key":"4","first-page":"2342","article-title":"Towards a generic formal framework for access control systems","volume":"1204","author":"crampton","year":"2012","journal-title":"CoRR Abs"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1080\/10919399409540214"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2178431"}],"event":{"name":"2013 9th International Conference on Network and Service Management (CNSM)","location":"Zurich, Switzerland","start":{"date-parts":[[2013,10,14]]},"end":{"date-parts":[[2013,10,18]]}},"container-title":["Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6713382\/6727796\/06727843.pdf?arnumber=6727843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T01:33:47Z","timestamp":1688952827000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6727843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2013.6727843","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}