{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:45:39Z","timestamp":1771699539656,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1145\/1063979.1063998","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"102-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":161,"title":["Purpose based access control of complex data for privacy protection"],"prefix":"10.1145","author":[{"given":"Ji-Won","family":"Byun","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2005,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The 28th International Conference on Very Large Databases (VLDB)","author":"Kiernan Jerry","year":"2002","unstructured":"Agrawal, Jerry Kiernan , Ramakrishman Srikant , and Yirong Xu . Hippocratic databases .In The 28th International Conference on Very Large Databases (VLDB) , 2002 . Agrawal, Jerry Kiernan, Ramakrishman Srikant, and Yirong Xu.Hippocratic databases.In The 28th International Conference on Very Large Databases (VLDB), 2002."},{"key":"e_1_3_2_1_2_1","volume-title":"mathematical foundations and model.Technical report","author":"Bell David","year":"1974","unstructured":"David Bell and Leonard LaPadula . Secure computer systems : mathematical foundations and model.Technical report , MITRE Corporation , 1974 David Bell and Leonard LaPadula.Secure computer systems: mathematical foundations and model.Technical report, MITRE Corporation, 1974"},{"key":"e_1_3_2_1_3_1","volume-title":"Purdue University","author":"Byun Jiwon","year":"2004","unstructured":"Jiwon Byun , Elisa Bertino , and Ninghui Li . Purpose-based access control for privacy protection in relational database systems.Technical Report 2004-52 , Purdue University , 2004 Jiwon Byun, Elisa Bertino, and Ninghui Li.Purpose-based access control for privacy protection in relational database systems.Technical Report 2004-52, Purdue University, 2004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/270152.270177"},{"key":"e_1_3_2_1_5_1","unstructured":"Federal Trade Commision.Children's online privacy protection act of 1998. Available at www.cdt.org\/legislation\/105th\/privacy\/coppa.html  Federal Trade Commision.Children's online privacy protection act of 1998. Available at www.cdt.org\/legislation\/105th\/privacy\/coppa.html"},{"key":"e_1_3_2_1_6_1","volume-title":"The IEEE Symposium on Research in Security and Privacy","author":"Denning Dorothy","year":"1998","unstructured":"Dorothy Denning , Teresa Lunt , Roger Schell , William Shockley , and Mark Heckman . The seaview security model .In The IEEE Symposium on Research in Security and Privacy , 1998 Dorothy Denning, Teresa Lunt, Roger Schell, William Shockley, and Mark Heckman.The seaview security model.In The IEEE Symposium on Research in Security and Privacy, 1998"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286898"},{"key":"e_1_3_2_1_8_1","unstructured":"IBM. The Enterprise Privacy Authorization Language (EPAL).Available at www.zurich.ibm.com\/security\/enterprise-privacy\/epal  IBM. The Enterprise Privacy Authorization Language (EPAL).Available at www.zurich.ibm.com\/security\/enterprise-privacy\/epal"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/567331.567336"},{"key":"e_1_3_2_1_10_1","volume-title":"The 30th International Conference on Very Large Databases (VLDB)","author":"LeFevre Kristen","year":"2004","unstructured":"Kristen LeFevre , Rakesh Agrawal , Vuk Ercegovac , Raghu Ramakrishnan , Yirong Xu , and David DeWitt . Disclosure in hippocratic databases .In The 30th International Conference on Very Large Databases (VLDB) , August 2004 . Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan,Yirong Xu, and David DeWitt.Disclosure in hippocratic databases.In The 30th International Conference on Very Large Databases (VLDB), August 2004."},{"key":"e_1_3_2_1_11_1","unstructured":"United State Department of Health.Health insurance portability and accountability act of 1996.Available at www.hep-c-alert.org\/links\/hippa.html  United State Department of Health.Health insurance portability and accountability act of 1996.Available at www.hep-c-alert.org\/links\/hippa.html"},{"key":"e_1_3_2_1_12_1","unstructured":"United State Department of Justice.The federal privacy act of 1974.Available at www.usdoj.gov\/foia\/privstat.htm  United State Department of Justice.The federal privacy act of 1974.Available at www.usdoj.gov\/foia\/privstat.htm"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/103140.103144"},{"key":"e_1_3_2_1_14_1","volume-title":"Role hierarchies and constraints for lattice-based access control.In the European Symposium on Research in Computer Security","author":"Sandhu Ravi","year":"1996","unstructured":"Ravi Sandhu . Role hierarchies and constraints for lattice-based access control.In the European Symposium on Research in Computer Security , 1996 Ravi Sandhu. Role hierarchies and constraints for lattice-based access control.In the European Symposium on Research in Computer Security, 1996"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290171"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/115790.115796"},{"key":"e_1_3_2_1_18_1","unstructured":"World Wide Web Consortium (W3C). Platform for Privacy Preferences (P3P). Available at www.w3.org\/P3P.  World Wide Web Consortium (W3C). Platform for Privacy Preferences (P3P). Available at www.w3.org\/P3P."}],"event":{"name":"SACMAT05: 10th ACM Symposium on Access Control Models and Technologies 2005","location":"Stockholm Sweden","acronym":"SACMAT05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the tenth ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1063998","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1063979.1063998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:12Z","timestamp":1750263552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1063998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":18,"alternative-id":["10.1145\/1063979.1063998","10.1145\/1063979"],"URL":"https:\/\/doi.org\/10.1145\/1063979.1063998","relation":{},"subject":[],"published":{"date-parts":[[2005,6]]},"assertion":[{"value":"2005-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}