{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:12Z","timestamp":1774946352542,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046726","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"151-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Policy auditing over incomplete logs"],"prefix":"10.1145","author":[{"given":"Deepak","family":"Garg","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Limin","family":"Jia","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Anupam","family":"Datta","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Moffett Field, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/174644.174651"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01213601"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1807707.1807718"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_10"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24622-0_5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.26"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809849"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025711105609"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646735.701611"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0017-y"},{"key":"e_1_3_2_1_13_1","volume-title":"White Paper","year":"2007","unstructured":"Deloitte & Touche and the Ponemon Institute. Enterprise@Risk: 2007 Privacy and Data Protection Survey . White Paper , December 2007 . Deloitte & Touche and the Ponemon Institute. Enterprise@Risk: 2007 Privacy and Data Protection Survey. White Paper, December 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"Office of the Secretary. HIPAA Privacy Rule accounting of disclosures under the health information technology for economic and clinical health act. 45 CFR 164","author":"Department of Health and Human Services","year":"2011","unstructured":"Department of Health and Human Services , Office of the Secretary. HIPAA Privacy Rule accounting of disclosures under the health information technology for economic and clinical health act. 45 CFR 164 , 2011 . Available at http:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2011-05--31\/pdf\/2011--13297.pdf. Department of Health and Human Services, Office of the Secretary. HIPAA Privacy Rule accounting of disclosures under the health information technology for economic and clinical health act. 45 CFR 164, 2011. Available at http:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2011-05--31\/pdf\/2011--13297.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393847.2393881"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA579934"},{"key":"e_1_3_2_1_18_1","first-page":"37","volume-title":"Proceeding of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX)","author":"Giblin C.","year":"2005","unstructured":"C. Giblin , A. Y. Liu , S. M\u00fcller , B. Pfitzmann , and X. Zhou . Regulations expressed as logical models (REALM) . In Proceeding of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX) , pages 37 -- 48 , 2005 . C. Giblin, A. Y. Liu, S. M\u00fcller, B. Pfitzmann, and X. Zhou. Regulations expressed as logical models (REALM). In Proceeding of the 18th Annual Conference on Legal Knowledge and Information Systems (JURIX), pages 37--48, 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2005.28"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180423"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03748-1_8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.462.0335"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/211468"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.24"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377857"},{"key":"e_1_3_2_1_27_1","volume-title":"Extensible access control markup language (XACML) v2.0","author":"OASIS XACML Committee","year":"2004","unstructured":"OASIS XACML Committee . Extensible access control markup language (XACML) v2.0 , 2004 . Available at http:\/\/www.oasis-open.org\/specs\/\\#xacmlv2.0. OASIS XACML Committee. Extensible access control markup language (XACML) v2.0, 2004. Available at http:\/\/www.oasis-open.org\/specs\/\\#xacmlv2.0."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507722"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-005-6205-y"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/872752.873518"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.02.006"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.01.029"},{"key":"e_1_3_2_1_33_1","volume-title":"Congress. Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC S6801--S6809","author":"US","year":"1999","unstructured":"US Congress. Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC S6801--S6809 , November 1999 . Available at http:\/\/www.law.cornell.edu\/uscode\/usc_sup_01_15_10_94_20_I.html. US Congress. Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC S6801--S6809, November 1999. Available at http:\/\/www.law.cornell.edu\/uscode\/usc_sup_01_15_10_94_20_I.html."},{"key":"e_1_3_2_1_34_1","volume-title":"Congress. Health Insurance Portability and Accountability Act of 1996","author":"US","year":"2002","unstructured":"US Congress. Health Insurance Portability and Accountability Act of 1996 , Privacy Rule. 45 CFR 164 , 2002 . Available at http:\/\/www.access.gpo.gov\/nara\/cfr\/waisidx_07\/45cfr164_07.html. US Congress. Health Insurance Portability and Accountability Act of 1996, Privacy Rule. 45 CFR 164, 2002. Available at http:\/\/www.access.gpo.gov\/nara\/cfr\/waisidx_07\/45cfr164_07.html."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046726"}},"subtitle":["theory, implementation and applications"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":33,"alternative-id":["10.1145\/2046707.2046726","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046726","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}