{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T17:45:01Z","timestamp":1761155101832,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314436.1314439","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"12-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["A simple and expressive semantic framework for policy composition in access control"],"prefix":"10.1145","author":[{"given":"Glenn","family":"Bruns","sequence":"first","affiliation":[{"name":"Alcatel-Lucent, Lisle, IL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel S","family":"Dantas","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Huth","sequence":"additional","affiliation":[{"name":"Imperial College London, London, England UK"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/155183.155225"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/788020.788917"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00032-0"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30569-9_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-1161-7_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11814771_51"},{"key":"e_1_3_2_1_9_1","first-page":"554","volume-title":"Proc. of the NIST-NSA National (USA) Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and D. R. Kuhn . Role-Based Access Control . In Proc. of the NIST-NSA National (USA) Computer Security Conference , pages 554 -- 563 , 1992 . D. Ferraiolo and D. R. Kuhn. Role-Based Access Control. In Proc. of the NIST-NSA National (USA) Computer Security Conference, pages 554--563, 1992."},{"key":"e_1_3_2_1_10_1","volume-title":"Role-Based Access Control","author":"Ferraiolo D. F.","year":"2003","unstructured":"D. F. Ferraiolo , D. R. Kuhn , and R. Chandramouli . Role-Based Access Control ( Second Edition). Artech House, Inc. , Norwood, MA, USA , 2003 . D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli. Role-Based Access Control (Second Edition). Artech House, Inc., Norwood, MA, USA, 2003."},{"key":"e_1_3_2_1_11_1","first-page":"238","volume-title":"20th Int'l Symposium on Multiple-Valued Logic, Charlotte","author":"Fitting M.","year":"1990","unstructured":"M. Fitting . Bilattices in logic programming . In 20th Int'l Symposium on Multiple-Valued Logic, Charlotte , pages 238 -- 247 . IEEE CS Press , Los Alamitos , 1990 . M. Fitting. Bilattices in logic programming. In 20th Int'l Symposium on Multiple-Valued Logic, Charlotte, pages 238--247. IEEE CS Press, Los Alamitos, 1990."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(91)90014-G"},{"key":"e_1_3_2_1_13_1","volume-title":"Kleene's three valued logics and their children. Fundam. Inf., 20(1--3):113--131","author":"Fitting M.","year":"1994","unstructured":"M. Fitting . Kleene's three valued logics and their children. Fundam. Inf., 20(1--3):113--131 , 1994 . M. Fitting. Kleene's three valued logics and their children. Fundam. Inf., 20(1--3):113--131, 1994."},{"key":"e_1_3_2_1_14_1","first-page":"53","volume-title":"Bilattices are nice things","author":"Fitting M.","year":"2006","unstructured":"M. Fitting . Bilattices are nice things . In T. Bolander, V. Hendricks, and S. A. Pedersen, editors, Self-Reference, pages 53 -- 77 . Center for the Study of Language and Information, 2006 . M. Fitting. Bilattices are nice things. In T. Bolander, V. Hendricks, and S. A. Pedersen, editors, Self-Reference, pages 53--77. Center for the Study of Language and Information, 2006."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.1988.tb00280.x"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212713"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"key":"e_1_3_2_1_18_1","volume-title":"Introduction to Metamathematics","author":"Kleene S. C.","year":"1952","unstructured":"S. C. Kleene . Introduction to Metamathematics . D. Van Nostrand , 1952 . S. C. Kleene. Introduction to Metamathematics. D. Van Nostrand, 1952."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180337.1180342"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919399409540214"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/519627.790250"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of the Network and Distributed System Security Symposium (NDSS). Internet Society","author":"Ribeiro C.","year":"2001","unstructured":"C. Ribeiro , A. Zuquete , P. Ferreira , and P. Guedes . SPL: An access control language for security policies and complex constraints . In Proc. of the Network and Distributed System Security Symposium (NDSS). Internet Society , 2001 . C. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes. SPL: An access control language for security policies and complex constraints. In Proc. of the Network and Distributed System Security Symposium (NDSS). Internet Society, 2001."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Formal methods in security engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314436.1314439","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314436.1314439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314436.1314439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":22,"alternative-id":["10.1145\/1314436.1314439","10.1145\/1314436"],"URL":"https:\/\/doi.org\/10.1145\/1314436.1314439","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}