{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:34:27Z","timestamp":1760708067884,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T00:00:00Z","timestamp":1243987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,3]]},"DOI":"10.1145\/1542207.1542218","type":"proceedings-article","created":{"date-parts":[[2009,6,9]],"date-time":"2009-06-09T12:44:24Z","timestamp":1244551464000},"page":"63-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["An algebra for fine-grained integration of XACML policies"],"prefix":"10.1145","author":[{"given":"Prathima","family":"Rao","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Dan","family":"Lin","sequence":"additional","affiliation":[{"name":"Missouri University of Science &amp; Technology, Rolla, MO, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Jorge","family":"Lobo","sequence":"additional","affiliation":[{"name":"IBM TJ Watson Research Center, Hawthorne, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/fke.utm.my\/downloads\/espresso\/.  http:\/\/fke.utm.my\/downloads\/espresso\/."},{"volume-title":"OASIS Standard","year":"2005","key":"e_1_3_2_1_2_1","unstructured":"Extensible access control markup language (XACML) version 2.0 , OASIS Standard , 2005 . Extensible access control markup language (XACML) version 2.0, OASIS Standard, 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"OASIS","author":"Anderson A.","year":"2003","unstructured":"A. Anderson . Evaluating xacml as a policy language. Technical report , OASIS , 2003 . A. Anderson. Evaluating xacml as a policy language. Technical report, OASIS, 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00032-0"},{"key":"e_1_3_2_1_5_1","unstructured":"P. Ashley S. Hada G. Karjoth C. Powers and M. Schunter. Enterprise privacy authorization language (EPAL).  P. Ashley S. Hada G. Karjoth C. Powers and M. Schunter. Enterprise privacy authorization language (EPAL)."},{"volume-title":"IBM Research","year":"2003","key":"e_1_3_2_1_6_1","unstructured":"Research report 3485 , IBM Research , 2003 . Research report 3485, IBM Research, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314436.1314439"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008647823331"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622420.1622423"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212713"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1069774.1069790"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/2267650"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133089"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178618.1178620"},{"key":"e_1_3_2_1_18_1","volume-title":"CERIAS","author":"Rao P.","year":"2008","unstructured":"P. Rao , D. Lin , E. Bertino , N. Li , and J. Lobo . An algebra for fine-grained integration of xacml policies. Technical report , CERIAS , 2008 . P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo. An algebra for fine-grained integration of xacml policies. Technical report, CERIAS, 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1967-0217002-1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1112\/plms\/s3-16.1.167"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762481"}],"event":{"name":"SACMAT '09: 14th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Stresa Italy","acronym":"SACMAT '09"},"container-title":["Proceedings of the 14th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542207.1542218","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1542207.1542218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:58Z","timestamp":1750253398000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542207.1542218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,3]]},"references-count":22,"alternative-id":["10.1145\/1542207.1542218","10.1145\/1542207"],"URL":"https:\/\/doi.org\/10.1145\/1542207.1542218","relation":{},"subject":[],"published":{"date-parts":[[2009,6,3]]},"assertion":[{"value":"2009-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}