{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:18Z","timestamp":1750307778546,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314418.1314434","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"99-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Evaluating distributed xacml policies"],"prefix":"10.1145","author":[{"given":"Vijayant","family":"Dhankhar","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Saket","family":"Kaushik","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Anil","family":"Nerode","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 07)","author":"Dhankhar V.","year":"2007","unstructured":"V. Dhankhar , S. Kaushik , and D. Wijesekera . Xacml policies for exclusive resource usage . In 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 07) , 2007 . V. Dhankhar, S. Kaushik, and D. Wijesekera. Xacml policies for exclusive resource usage. In 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 07), 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-08755-9_9","volume-title":"Operating Systems, An Advanced Course","author":"Gray J.","year":"1978","unstructured":"J. Gray . Notes on data base operating systems . In Operating Systems, An Advanced Course , pages 393 -- 481 , London, UK , 1978 . Springer-Verlag . J. Gray. Notes on data base operating systems. In Operating Systems, An Advanced Course, pages 393--481, London, UK, 1978. Springer-Verlag."},{"key":"e_1_3_2_1_5_1","first-page":"83","volume-title":"Proceedings of the 16th International Conference on Very Large Data Bases","author":"Nodine M. H.","year":"1990","unstructured":"M. H. Nodine and S. B. Zdonik . Cooperative transaction hierarchies: A transaction model to support design applications source very large data bases . In Proceedings of the 16th International Conference on Very Large Data Bases , pages 83 -- 94 , 1990 . M. H. Nodine and S. B. Zdonik. Cooperative transaction hierarchies: A transaction model to support design applications source very large data bases. In Proceedings of the 16th International Conference on Very Large Data Bases, pages 83--94, 1990."},{"key":"e_1_3_2_1_6_1","volume-title":"Feb","author":"OASIS.","year":"2005","unstructured":"OASIS. Extensible access control markup language , Feb 2005 . OASIS. Extensible access control markup language, Feb 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"Access control for collaborative environments","author":"Shen H.","year":"1992","unstructured":"H. Shen and P. Dewan . Access control for collaborative environments . Software Engineering Research Center SERC-TR- 123-P, NASA Advanced Supercomputing (NAS) Division, Aug 1992 H. Shen and P. Dewan. Access control for collaborative environments. Software Engineering Research Center SERC-TR-123-P, NASA Advanced Supercomputing (NAS) Division, Aug 1992"},{"key":"e_1_3_2_1_8_1","unstructured":"Sun. Sun's xacml implementation. http:\/\/sunxacml.sourceforge.net\/index.html July 2004.  Sun. Sun's xacml implementation. http:\/\/sunxacml.sourceforge.net\/index.html July 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057979"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Secure web services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314418.1314434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314418.1314434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314418.1314434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":7,"alternative-id":["10.1145\/1314418.1314434","10.1145\/1314418"],"URL":"https:\/\/doi.org\/10.1145\/1314418.1314434","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}