{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:23:54Z","timestamp":1761708234400,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T00:00:00Z","timestamp":1216771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,23]]},"DOI":"10.1145\/1408664.1408675","type":"proceedings-article","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T21:44:44Z","timestamp":1220564684000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Expressions of expertness"],"prefix":"10.1145","author":[{"given":"Philip","family":"Inglesant","sequence":"first","affiliation":[{"name":"University College London, London, UK"}]},{"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"University College London, London, UK"}]},{"given":"David","family":"Chadwick","sequence":"additional","affiliation":[{"name":"University of Kent, Kent, UK"}]},{"given":"Lei Lei","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Kent, Kent, UK"}]}],"member":"320","published-online":{"date-parts":[[2008,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"volume-title":"Joint Proceedings of HCI 2001 and ICM 2001","year":"2001","author":"Adams A.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143123"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v35:9"},{"volume-title":"Security in the Information Society: Visions and Perspectives: IFIP TC11 17th International Conference on Information Security (SEC2002)","year":"2002","author":"Chadwick D.","key":"e_1_3_2_1_5_1"},{"volume-title":"The Virtuous Circle of Expressing Authorisation Policies. In: Proceedings of Second Semantic Web Policy Workshop (SWPW'06)","year":"2006","author":"Chadwick D.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1399603.1399607"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646684.702641"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.013589"},{"volume-title":"CLOnE: Controlled Language for Ontology Editing. In: Proceedings of 6th International Semantic Web Conference (ISWC)","year":"2007","author":"Funk A.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Gollmann D. Computer Security. John Wiley &amp; Sons Ltd. Chichester UK 1999   Gollmann D. Computer Security. John Wiley &amp; Sons Ltd. Chichester UK 1999"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015621120332"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124787"},{"volume-title":"The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications Sears, Andrew and Jacko, Julie A (Eds","author":"Karat J.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Nielsen J. Ten Usability Heuristics http:\/\/www.useit.com\/papers\/heuristic\/heuristic_list.html  Nielsen J. Ten Usability Heuristics http:\/\/www.useit.com\/papers\/heuristic\/heuristic_list.html"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0410"},{"volume-title":"Controlled Language for Knowledge Representation. In: CLAW96: Proceedings of the First International Workshop on Controlled Language Applications","year":"1996","author":"Pulman S. G.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.25"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/800025.1198367"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"volume-title":"Proceedings of the 8th USENIX Security Symposium","year":"1999","author":"Whitten A.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/646280.687663"},{"volume-title":"IEEE Symposium on Security and Privacy","year":"1999","author":"Zurko M. E.","key":"e_1_3_2_1_24_1"}],"event":{"name":"SOUPS '08: The fourth Symposium on Usable Privacy and Security","acronym":"SOUPS '08","location":"Pittsburgh Pennsylvania USA"},"container-title":["Proceedings of the 4th symposium on Usable privacy and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1408664.1408675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:44Z","timestamp":1750255064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408675"}},"subtitle":["the virtuous circle of natural language for access control policy specification"],"short-title":[],"issued":{"date-parts":[[2008,7,23]]},"references-count":24,"alternative-id":["10.1145\/1408664.1408675","10.1145\/1408664"],"URL":"https:\/\/doi.org\/10.1145\/1408664.1408675","relation":{},"subject":[],"published":{"date-parts":[[2008,7,23]]},"assertion":[{"value":"2008-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}