{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:36Z","timestamp":1750308756740,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T00:00:00Z","timestamp":1182297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,20]]},"DOI":"10.1145\/1266840.1266874","type":"proceedings-article","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T19:20:55Z","timestamp":1190748055000},"page":"205-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["PolicyMorph"],"prefix":"10.1145","author":[{"given":"Michael","family":"LeMay","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Omid","family":"Fatemieh","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2007,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281243"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950194"},{"key":"e_1_3_2_1_3_1","volume-title":"Secure computer systems: Mathematical foundations (volume 1). Technical report","author":"Bell D.","year":"1973","unstructured":"D. Bell and L. Lapadula . Secure computer systems: Mathematical foundations (volume 1). Technical report , 1973 . D. Bell and L. Lapadula. Secure computer systems: Mathematical foundations (volume 1). Technical report, 1973."},{"key":"e_1_3_2_1_5_1","volume-title":"SPC '05: Proceedings of the 3rd International Conference on Security in Pervasive Computing","author":"Boyer J. P.","year":"2005","unstructured":"J. P. Boyer , K. Tan , and C. A. Gunter . Privacy sensitive location information systems in smart buildings . In SPC '05: Proceedings of the 3rd International Conference on Security in Pervasive Computing , 2005 . J. P. Boyer, K. Tan, and C. A. Gunter. Privacy sensitive location information systems in smart buildings. In SPC '05: Proceedings of the 3rd International Conference on Security in Pervasive Computing, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775419"},{"key":"e_1_3_2_1_8_1","volume-title":"CW report, 312","author":"Demoen B.","year":"2001","unstructured":"B. Demoen and P. Nguyen . Odd Prolog benchmarking. KU Leuven , CW report, 312 , 2001 . B. Demoen and P. Nguyen. Odd Prolog benchmarking. KU Leuven, CW report, 312, 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_10_1","first-page":"187","volume-title":"Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE","author":"Halpern J.","unstructured":"J. Halpern and V. Weissman . Using first-order logic to reason about policies . Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE , pages 187 -- 201 . J. Halpern and V. Weissman. Using first-order logic to reason about policies. Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, pages 187--201."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990053"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/501963.501966"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030092"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646061.676166"},{"key":"e_1_3_2_1_17_1","volume-title":"The art of Prolog","author":"Sterling L.","year":"1994","unstructured":"L. Sterling and E. Shapiro . The art of Prolog ( 2 nd ed.): advanced programming techniques. MIT Press , Cambridge, MA, USA , 1994 . L. Sterling and E. Shapiro. The art of Prolog (2nd ed.): advanced programming techniques. MIT Press, Cambridge, MA, USA, 1994.","edition":"2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"}],"event":{"name":"SACMAT07: 12th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Sophia Antipolis France","acronym":"SACMAT07"},"container-title":["Proceedings of the 12th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266840.1266874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1266840.1266874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:25Z","timestamp":1750278145000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266840.1266874"}},"subtitle":["interactive policy transformations for a logical attribute-based access control framework"],"short-title":[],"issued":{"date-parts":[[2007,6,20]]},"references-count":17,"alternative-id":["10.1145\/1266840.1266874","10.1145\/1266840"],"URL":"https:\/\/doi.org\/10.1145\/1266840.1266874","relation":{},"subject":[],"published":{"date-parts":[[2007,6,20]]},"assertion":[{"value":"2007-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}