{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:12:15Z","timestamp":1761894735064,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,11]],"date-time":"2008-06-11T00:00:00Z","timestamp":1213142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,11]]},"DOI":"10.1145\/1377836.1377849","type":"proceedings-article","created":{"date-parts":[[2008,6,10]],"date-time":"2008-06-10T14:13:22Z","timestamp":1213107202000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":111,"title":["R\n            <i>OWL<\/i>\n            BAC"],"prefix":"10.1145","author":[{"given":"T.","family":"Finin","sequence":"first","affiliation":[{"name":"Univ. of Maryland"}]},{"given":"A.","family":"Joshi","sequence":"additional","affiliation":[{"name":"Univ. of Maryland"}]},{"given":"L.","family":"Kagal","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]},{"given":"J.","family":"Niu","sequence":"additional","affiliation":[{"name":"Univ. of Texas at San Antonio"}]},{"given":"R.","family":"Sandhu","sequence":"additional","affiliation":[{"name":"Univ. of Texas at San Antonio"}]},{"given":"W.","family":"Winsborough","sequence":"additional","affiliation":[{"name":"Univ. of Texas at San Antonio"}]},{"given":"B.","family":"Thuraisingham","sequence":"additional","affiliation":[{"name":"Univ. of Texas Dallas"}]}],"member":"320","published-online":{"date-parts":[[2008,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784782"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. DL","author":"Baader F.","year":"2003","unstructured":"F. Baader . Restricted role-value-maps in a description logic with existential restrictions and terminological cycles . Proc. DL 2003 . F. Baader. Restricted role-value-maps in a description logic with existential restrictions and terminological cycles. Proc. DL 2003."},{"key":"e_1_3_2_1_3_1","volume-title":"The Description Logic Handbook: Theory, Implementation, and Applications","author":"Baader F.","year":"2003","unstructured":"F. Baader . The Description Logic Handbook: Theory, Implementation, and Applications . Cambridge University Press , 2003 . F. Baader. The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784743"},{"key":"e_1_3_2_1_5_1","volume-title":"I. Horrocks, D. L. McGuinness, P. F. Patel-Schneider, and L. A. Stein. Owl web ontology language reference","author":"Bechhofer S.","year":"2004","unstructured":"S. Bechhofer , F. van Harmelen Jim Hendler , I. Horrocks, D. L. McGuinness, P. F. Patel-Schneider, and L. A. Stein. Owl web ontology language reference , February 2004 . http:\/\/www.w3.org\/TR\/owl-ref. S. Bechhofer, F. van Harmelen Jim Hendler, I. Horrocks, D. L. McGuinness, P. F. Patel-Schneider, and L. A. Stein. Owl web ontology language reference, February 2004. http:\/\/www.w3.org\/TR\/owl-ref."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068407003213"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","volume-title":"The ponder policy specification language","author":"Damianou N.","year":"1995","unstructured":"N. Damianou , N. Dulay , E. Lupu , and M. Sloman . The ponder policy specification language . Lecture Notes in Computer Science , 1995 , 2001. N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. Lecture Notes in Computer Science, 1995, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2005.247"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_11_1","volume-title":"November","author":"Godik S.","year":"2002","unstructured":"S. Godik and T. Moses . OASIS extensible access control markup language (XACML). OASIS Committee Secification cs-xacml-specification-1.0 , November 2002 . S. Godik and T. Moses. OASIS extensible access control markup language (XACML). OASIS Committee Secification cs-xacml-specification-1.0, November 2002."},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/www.w3.org\/TR\/rdf-mt\/","author":"Hayes P.","year":"2004","unstructured":"P. Hayes and B. McBride . RDF Semantics . http:\/\/www.w3.org\/TR\/rdf-mt\/ , 2004 . P. Hayes and B. McBride. RDF Semantics. http:\/\/www.w3.org\/TR\/rdf-mt\/, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11811220_15"},{"key":"e_1_3_2_1_14_1","volume-title":"SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission, 21","author":"Horrocks I.","year":"2004","unstructured":"I. Horrocks , P. Patel-Schneider , H. Boley , S. Tabet , B. Grosof , and M. Dean . SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission, 21 , 2004 . I. Horrocks, P. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission, 21, 2004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884380"},{"key":"e_1_3_2_1_16_1","volume-title":"Fourth IEEE International Workshop on Policies for Distributed Systems and Networks","author":"Kagal L.","year":"2003","unstructured":"L. Kagal , T. Finin , and A. Joshi . A policy language for pervasive systems . In Fourth IEEE International Workshop on Policies for Distributed Systems and Networks , 2003 . L. Kagal, T. Finin, and A. Joshi. A policy language for pervasive systems. In Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Resource Description Framework (RDF) Model and Syntax Specification","author":"Lassila O.","year":"1999","unstructured":"O. Lassila , R. Swick , Resource Description Framework (RDF) Model and Syntax Specification . 1999 . O. Lassila, R. Swick, et al. Resource Description Framework (RDF) Model and Syntax Specification. 1999."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of IEEE Symp. on Security and Privacy","author":"Li N.","year":"2000","unstructured":"N. Li , B. N. Grosof , and J. Feigenbaum . A practically implementable and tractable delegation logic . In Proc. of IEEE Symp. on Security and Privacy , Oakland, CA, USA , May 2000 , 2000. N. Li, B. N. Grosof, and J. Feigenbaum. A practically implementable and tractable delegation logic. In Proc. of IEEE Symp. on Security and Privacy, Oakland, CA, USA, May 2000, 2000."},{"key":"e_1_3_2_1_19_1","first-page":"123","volume-title":"RT: A Role-based Trust-management Framework. DARPA Information Survivability Conference and Exposition (DISCEX)","author":"Li N.","unstructured":"N. Li and J. Mitchell . RT: A Role-based Trust-management Framework. DARPA Information Survivability Conference and Exposition (DISCEX) , pages 123 -- 139 . N. Li and J. Mitchell. RT: A Role-based Trust-management Framework. DARPA Information Survivability Conference and Exposition (DISCEX), pages 123--139."},{"key":"e_1_3_2_1_20_1","first-page":"114","volume-title":"Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on","author":"Li N.","year":"2002","unstructured":"N. Li , J. Mitchell , and W. Winsborough . Design of a role-based trust-management framework . Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on , pages 114 -- 130 , 2002 . N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pages 114--130, 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066100.1066103"},{"key":"e_1_3_2_1_22_1","volume-title":"February","author":"McGuinness D. L.","year":"2004","unstructured":"D. L. McGuinness and F. van Harmelen . Owl web ontology language overview , February 2004 . http:\/\/www.w3.org\/TR\/owl-features\/. D. L. McGuinness and F. van Harmelen. Owl web ontology language overview, February 2004. http:\/\/www.w3.org\/TR\/owl-features\/."},{"key":"e_1_3_2_1_23_1","first-page":"200502","article-title":"eXtensible Access Control Markup Language (XACML) Version 2.0","author":"Moses T.","year":"2005","unstructured":"T. Moses eXtensible Access Control Markup Language (XACML) Version 2.0 . OASIS Standard , 200502 , 2005 . T. Moses et al. eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005.","journal-title":"OASIS Standard"},{"issue":"6","key":"e_1_3_2_1_24_1","article-title":"The UCONABC usage control model","volume":"5","author":"Park J.","year":"2007","unstructured":"J. Park and R. Sandhu . The UCONABC usage control model . ACM Transactions on Information and System Security , 5 ( 6 ), 2007 . J. Park and R. Sandhu. The UCONABC usage control model. ACM Transactions on Information and System Security, 5(6), 2007.","journal-title":"ACM Transactions on Information and System Security"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151053"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2007.4401061"},{"key":"e_1_3_2_1_27_1","volume-title":"Network and Distributed System Security Symposium (NDSS'01)","author":"Ribeiro C. N.","year":"2001","unstructured":"C. N. Ribeiro , A. Zuquete , P. Ferreira , and P. Guedes . SPL: An access control language for security policies with complex constraints . In Network and Distributed System Security Symposium (NDSS'01) , 2001 . C. N. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes. SPL: An access control language for security policies with complex constraints. In Network and Distributed System Security Symposium (NDSS'01), 2001."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_29_1","volume-title":"Advances in Computers","author":"Sandhu R. S.","year":"1998","unstructured":"R. S. Sandhu . Role-based access control. In M. Zerkowitz, editor, Advances in Computers , volume 48 . Academic Press , 1998 . R. S. Sandhu. Role-based access control. In M. Zerkowitz, editor, Advances in Computers, volume 48. Academic Press, 1998."},{"key":"e_1_3_2_1_30_1","volume-title":"Fachber. Informatik","author":"Schmidt-Schauss M.","year":"1988","unstructured":"M. Schmidt-Schauss . Subsumption in KL-one is undecidable . Fachber. Informatik , Univ , 1988 . M. Schmidt-Schauss. Subsumption in KL-one is undecidable. Fachber. Informatik, Univ, 1988."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.05.006"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.3"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_27"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"}],"event":{"name":"SACMAT08: 13th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Estes Park CO USA","acronym":"SACMAT08"},"container-title":["Proceedings of the 13th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1377836.1377849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1377836.1377849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:39Z","timestamp":1750254999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1377836.1377849"}},"subtitle":["representing role based access control in\n            <i>OWL<\/i>"],"short-title":[],"issued":{"date-parts":[[2008,6,11]]},"references-count":34,"alternative-id":["10.1145\/1377836.1377849","10.1145\/1377836"],"URL":"https:\/\/doi.org\/10.1145\/1377836.1377849","relation":{},"subject":[],"published":{"date-parts":[[2008,6,11]]},"assertion":[{"value":"2008-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}