{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:55Z","timestamp":1750307575014,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T00:00:00Z","timestamp":1257206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-SESUR-2007-FLUOR"],"award-info":[{"award-number":["ANR-SESUR-2007-FLUOR"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,3]]},"DOI":"10.1145\/1667502.1667506","type":"proceedings-article","created":{"date-parts":[[2009,12,15]],"date-time":"2009-12-15T12:55:59Z","timestamp":1260881759000},"page":"2-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Security policies for the visualization of Geo Data"],"prefix":"10.1145","author":[{"given":"Patrick","family":"Capolsini","sequence":"first","affiliation":[{"name":"Universit\u00e9 de la Polyn\u00e9sie fran\u00e7aise"}]},{"given":"Alban","family":"Gabillon","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de la Polyn\u00e9sie fran\u00e7aise"}]}],"member":"320","published-online":{"date-parts":[[2009,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Organization Based Access Control. in 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03)","author":"El-Kalam A.","year":"2003","unstructured":"El-Kalam , A. , et al. Organization Based Access Control. in 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03) . 2003 . Como, Italy : IEEE. El-Kalam, A., et al. Organization Based Access Control. in 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03). 2003. Como, Italy: IEEE."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/876878.879314"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11847366_59"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2007.012247"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11207-2_11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210265"},{"key":"e_1_3_2_1_11_1","volume-title":"F. and A. Mi\u00e8ge. Modeling Contexts in the Or-BAC Model. in 19th Annual Computer Security Applications Conference (ACSAC '03)","author":"Cuppens","year":"2003","unstructured":"Cuppens , F. and A. Mi\u00e8ge. Modeling Contexts in the Or-BAC Model. in 19th Annual Computer Security Applications Conference (ACSAC '03) . 2003 . Las Vegas, NV, USA. Cuppens, F. and A. Mi\u00e8ge. Modeling Contexts in the Or-BAC Model. in 19th Annual Computer Security Applications Conference (ACSAC '03). 2003. Las Vegas, NV, USA."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0051-9"},{"key":"e_1_3_2_1_13_1","unstructured":"OGC. Open Geospatial Consortium Inc. - About Us. 2008 {cited; Available from: http:\/\/www.opengeospatial.org\/about.  OGC. Open Geospatial Consortium Inc. - About Us . 2008 {cited; Available from: http:\/\/www.opengeospatial.org\/about."},{"key":"e_1_3_2_1_14_1","volume-title":"Common architecture","author":"Herring J. R.","year":"2006","unstructured":"Herring , J. R. , OpenGIS(R) Implementation Specification for Geographic information - Simple feature access - Part 1 : Common architecture . Open Geospatial Consortium Inc ., 2006 . OGC(R) 06-103r3. Herring, J. R., OpenGIS(R) Implementation Specification for Geographic information - Simple feature access - Part 1: Common architecture. Open Geospatial Consortium Inc., 2006. OGC(R) 06-103r3."},{"key":"e_1_3_2_1_15_1","volume-title":"Second Foundation of Computer Security WorkShop (FCS'04).","author":"Cuppens F.","year":"2004","unstructured":"Cuppens , F. , N. Cuppens-Boulahia , and A. Mi\u00e8ge . Inheritance hierarchies in the Or-BAC model and application in a network environment . in Second Foundation of Computer Security WorkShop (FCS'04). 2004 . Turku , Finland . Cuppens, F., N. Cuppens-Boulahia, and A. Mi\u00e8ge. Inheritance hierarchies in the Or-BAC model and application in a network environment. in Second Foundation of Computer Security WorkShop (FCS'04). 2004. Turku, Finland."},{"key":"e_1_3_2_1_16_1","volume-title":"WorkShop on Information and Computer Security (ICS'06).","author":"Cuppens F.","year":"2006","unstructured":"Cuppens , F. , N. Cuppens-Boulahia , and M. B. Ghorbel , High level conflict management strategies in advanced access control models , in WorkShop on Information and Computer Security (ICS'06). 2006 , Elsevier Sciences : Timisoara, Roumania . Cuppens, F., N. Cuppens-Boulahia, and M. B. Ghorbel, High level conflict management strategies in advanced access control models, in WorkShop on Information and Computer Security (ICS'06). 2006, Elsevier Sciences: Timisoara, Roumania."},{"key":"e_1_3_2_1_17_1","volume":"200","author":"Jan\u00e9e G.","unstructured":"Jan\u00e9e , G. , J. Frew , and L. L. Hill , Issues in Georeferenced Digital Libraries, in D- Lib Magazine. 200 4. Jan\u00e9e, G., J. Frew, and L. L. Hill, Issues in Georeferenced Digital Libraries, in D-Lib Magazine. 2004.","journal-title":"Lib Magazine."},{"key":"e_1_3_2_1_18_1","unstructured":"Rigaux P. M. Scholl and A. Voisard Spatial Databases with application to GIS. 2002: Elsevier. 410.  Rigaux P. M. Scholl and A. Voisard Spatial Databases with application to GIS . 2002: Elsevier. 410."},{"key":"e_1_3_2_1_19_1","volume-title":"7th Nordic workshop on secure IT systems (NORDSEC'03)","author":"Hansen F.","year":"2003","unstructured":"Hansen , F. and V. Oleshchuk . SRBAC: A spatial Role-Based Access Control Model for Mobile Systems . in 7th Nordic workshop on secure IT systems (NORDSEC'03) . 2003 . Gjvik, Norway. Hansen, F. and V. Oleshchuk. SRBAC: A spatial Role-Based Access Control Model for Mobile Systems. in 7th Nordic workshop on secure IT systems (NORDSEC'03). 2003. Gjvik, Norway."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/987683.987901"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1032222.1032236"},{"key":"e_1_3_2_1_22_1","volume-title":"In Proceedings of the 14th IFIP 11.3 Annual Working Conference on Database Security.","author":"Chun S. A.","year":"2000","unstructured":"Chun , S. A. and V. Atluri . Protecting privacy from continuous high-resolution satellite surveillance . in In Proceedings of the 14th IFIP 11.3 Annual Working Conference on Database Security. 2000 . Schoorl, The Netherlands. Chun, S. A. and V. Atluri. Protecting privacy from continuous high-resolution satellite surveillance. in In Proceedings of the 14th IFIP 11.3 Annual Working Conference on Database Security. 2000. Schoorl, The Netherlands."},{"key":"e_1_3_2_1_23_1","volume-title":"In Proceedings of the 16th IFIP WG 11.3 Conference on Data and Application Security.","author":"Atluri V.","year":"2002","unstructured":"Atluri , V. and P. Mazzoleni . A uniform indexing scheme for geo-spatial data and authorizations . in In Proceedings of the 16th IFIP WG 11.3 Conference on Data and Application Security. 2002 . Atluri, V. and P. Mazzoleni. A uniform indexing scheme for geo-spatial data and authorizations. in In Proceedings of the 16th IFIP WG 11.3 Conference on Data and Application Security. 2002."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.32"},{"key":"e_1_3_2_1_25_1","first-page":"273","volume-title":"3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI'08)","author":"Autrel F.","year":"2008","unstructured":"Autrel , F. , et al., MotOrBAC 2 : a security policy tool , in 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI'08) . 2008 : Loctudy, France. p. 273 -- 288 . Autrel, F., et al., MotOrBAC 2: a security policy tool, in 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI'08). 2008: Loctudy, France. p. 273--288."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013367.1013381"}],"event":{"name":"GIS '09: 17th SIGSPATIAL International Conference on Advances in Geographic Information Systems","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Seattle Washington","acronym":"GIS '09"},"container-title":["Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1667502.1667506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1667502.1667506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:07Z","timestamp":1750250467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1667502.1667506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,3]]},"references-count":26,"alternative-id":["10.1145\/1667502.1667506","10.1145\/1667502"],"URL":"https:\/\/doi.org\/10.1145\/1667502.1667506","relation":{},"subject":[],"published":{"date-parts":[[2009,11,3]]},"assertion":[{"value":"2009-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}