{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:35:19Z","timestamp":1729658119344,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/colcom.2007.4553811","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T10:35:25Z","timestamp":1215081325000},"page":"64-71","source":"Crossref","is-referenced-by-count":2,"title":["Towards mixed-initiative access control"],"prefix":"10.1109","author":[{"given":"Prasun","family":"Dewan","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Grudin","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Horvitz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COLCOM.2007.4553880"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253364"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/289444.289499"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/320455.320457"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587106"},{"key":"ref15","article-title":"Optimistic security: A new access control paradigm","author":"povey","year":"1999","journal-title":"Proc ACM New Security Paradigms Workshop"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/632716.632875"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180891"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587125"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031691"},{"key":"ref28","first-page":"159","article-title":"Discretionary adoption of group support software: Lessons from calendar applications","author":"palen","year":"2002","journal-title":"Implementing Collaboration Technologies in Industry"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057979"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/302979.302982"},{"key":"ref3","article-title":"Rules and policies vs. actual practice","author":"newsletter","year":"2005","journal-title":"Network World"},{"key":"ref6","first-page":"417","article-title":"Protection - principles and practice","volume":"40","author":"graham","year":"0","journal-title":"Spring Joint Computers Conf"},{"journal-title":"Active Notifications Proc IEEE CollaborateCom","year":"2007","author":"dewan","key":"ref29"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/775265.775268","article-title":"Protection","volume":"8","author":"lampson","year":"1971","journal-title":"ACM Operating System Review"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143461"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/336992.336995"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/642633.642635"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/274444.274446"},{"key":"ref1","article-title":"Toward Understanding Preferences for Sharing and Privacy","author":"olson","year":"2005","journal-title":"Proc CHI"},{"key":"ref20","article-title":"Instant Messaging and Interruption: Influence of Task Type on Performance","author":"czerwinski","year":"2000","journal-title":"OZCHI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1057237.1057243"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031638"},{"key":"ref24","article-title":"Reflections on Challenges and Promises of Mixed-Initiative Interaction","author":"horvitz","year":"2007","journal-title":"special issue on mixed-initiative assistants AI Magazine"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031690"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280689"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/11556992_31","article-title":"Device-enabled authorization in the Grey system","author":"bauer","year":"2005","journal-title":"Proceedings of the 8th Information Security Conference"}],"event":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","start":{"date-parts":[[2007,11,12]]},"location":"New York, NY, USA","end":{"date-parts":[[2007,11,15]]}},"container-title":["2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543894\/4553792\/04553811.pdf?arnumber=4553811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T05:38:07Z","timestamp":1497764287000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4553811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/colcom.2007.4553811","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}