{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:23Z","timestamp":1750308203182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030092","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"52-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["KNOW Why your access was denied"],"prefix":"10.1145","author":[{"given":"Apu","family":"Kapadia","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Geetanjali","family":"Sampemane","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Roy H.","family":"Campbell","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.537122"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872152"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/603404.603407"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/127601.127705"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365697"},{"key":"e_1_3_2_1_6_1","first-page":"554","volume-title":"Proc. 15th NIST-NCSC National Computer Security Conference","author":"Ferraiolo David F.","year":"1992","unstructured":"David F. Ferraiolo and D. Richard Kuhn . Role-based access controls . In Proc. 15th NIST-NCSC National Computer Security Conference , pages 554 - 563 , Baltimore, MD , October 1992 . David F. Ferraiolo and D. Richard Kuhn. Role-based access controls. In Proc. 15th NIST-NCSC National Computer Security Conference, pages 554-563, Baltimore, MD, October 1992."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/951513.951525"},{"key":"e_1_3_2_1_8_1","unstructured":"Jonathan Graehl. kbest a C++ library for efficiently finding the k shortest paths in a graph. Available from http:\/\/jonathan.graehl.org\/kbest.zip.  Jonathan Graehl. kbest a C++ library for efficiently finding the k shortest paths in a graph. Available from http:\/\/jonathan.graehl.org\/kbest.zip."},{"key":"e_1_3_2_1_9_1","first-page":"163","volume-title":"Proceedings ISAAC","author":"Horiyama Takashi","year":"1997","unstructured":"Takashi Horiyama and Shuzo Yajima . Exponential lower bounds on the size of OBDDs representing integer divistion . In Proceedings ISAAC , pages 163 -- 172 , 1997 . Takashi Horiyama and Shuzo Yajima. Exponential lower bounds on the size of OBDDs representing integer divistion. In Proceedings ISAAC, pages 163--172, 1997."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1012339"},{"key":"e_1_3_2_1_11_1","volume-title":"Encyclopedia of Information Systems","author":"Korf R.E.","year":"2002","unstructured":"R.E. Korf . Search techniques . In Hossein Bidgoli, editor, Encyclopedia of Information Systems . Academic Press , San Diego, CA , aug 2002 . R.E. Korf. Search techniques. In Hossein Bidgoli, editor, Encyclopedia of Information Systems. Academic Press, San Diego, CA, aug 2002."},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"71","volume-title":"D.Hutter et al.","author":"Kvarnstr\u00f6m H\u00e5kan","year":"2003","unstructured":"H\u00e5kan Kvarnstr\u00f6m , Hans Hedbom , and Erland Jonsson . Protecting security policies in ubiquitous environments using one-way functions . In D.Hutter et al. , editors, Security in Pervasive Computing 2003 , volume 2802 of LNCS , pages 71 -- 85 . Springer-Verlag , Heidelberg, 2003. H\u00e5kan Kvarnstr\u00f6m, Hans Hedbom, and Erland Jonsson. Protecting security policies in ubiquitous environments using one-way functions. In D.Hutter et al., editors, Security in Pervasive Computing 2003, volume 2802 of LNCS, pages 71--85. Springer-Verlag, Heidelberg, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/224841.224862"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1158281"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784783"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"e_1_3_2_1_21_1","first-page":"147","volume-title":"Proceedings of the 2004 IEEE Symposium on Security and Privacy","author":"William","year":"2004","unstructured":"William H. Winsborough and Ninghui Li. Safety in automated trust negotiation . In Proceedings of the 2004 IEEE Symposium on Security and Privacy , pages 147 -- 160 , Oakland, CA , May 2004 . IEEE Press. William H. Winsborough and Ninghui Li. Safety in automated trust negotiation. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, pages 147--160, Oakland, CA, May 2004. IEEE Press."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646280.687663"},{"key":"e_1_3_2_1_23_1","first-page":"110","volume-title":"Proceedings of the IEEE Symposium on Security and privacy","author":"Yu Ting","year":"2003","unstructured":"Ting Yu and Marianne Winslett . A unified scheme for resource protection in automated trust negotiation . In Proceedings of the IEEE Symposium on Security and privacy , pages 110 -- 122 , May 2003 . Ting Yu and Marianne Winslett. A unified scheme for resource protection in automated trust negotiation. In Proceedings of the IEEE Symposium on Security and privacy, pages 110--122, May 2003."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605435"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/960150.960160"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030092"}},"subtitle":["regulating feedback for usable security"],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":24,"alternative-id":["10.1145\/1030083.1030092","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030092","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}