{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:50:37Z","timestamp":1755838237171,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046727","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"163-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Automatic error finding in access-control policies"],"prefix":"10.1145","author":[{"given":"Karthick","family":"Jayaraman","sequence":"first","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Vijay","family":"Ganesh","sequence":"additional","affiliation":[{"name":"MIT, Boston, MA, USA"}]},{"given":"Mahesh","family":"Tripunitara","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"MIT, Boston, MA, USA"}]},{"given":"Steve","family":"Chapin","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aveska. http:\/\/www.aveksa.com\/solutions\/access-control-automation.cfm.  Aveska. http:\/\/www.aveksa.com\/solutions\/access-control-automation.cfm."},{"key":"e_1_3_2_1_2_1","unstructured":"SailPoint. http:\/\/www.sailpoint.com\/product\/compliance-manager\/policy-enforcement.php.  SailPoint. http:\/\/www.sailpoint.com\/product\/compliance-manager\/policy-enforcement.php."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130777"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503274"},{"issue":"6","key":"e_1_3_2_1_5_1","first-page":"413","article-title":"Safety in grammatical protection systems","volume":"12","author":"Budd T. A.","year":"1983","unstructured":"T. A. Budd . Safety in grammatical protection systems . Intl. Journal of Parallel Programming , 12 ( 6 ): 413 -- 431 , 1983 . T. A. Budd. Safety in grammatical protection systems. Intl. Journal of Parallel Programming, 12(6):413--431, 1983.","journal-title":"Journal of Parallel Programming"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/876638.876643"},{"key":"e_1_3_2_1_7_1","unstructured":"E. Clarke D. Kroening J. Ouaknine and O. Strichman. The completeness threshold for bounded model checking.  E. Clarke D. Kroening J. Ouaknine and O. Strichman. The completeness threshold for bounded model checking."},{"key":"e_1_3_2_1_8_1","volume-title":"Model Checking","author":"Clarke E. M.","year":"1999","unstructured":"E. M. Clarke , O. Grumberg , and D. A. Peled . Model Checking . The MIT Press , 1999 . E. M. Clarke, O. Grumberg, and D. A. Peled. Model Checking. The MIT Press, 1999."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762478"},{"key":"e_1_3_2_1_10_1","volume-title":"Role-Based Access Control","author":"Ferraiolo D. F.","year":"2003","unstructured":"D. F. Ferraiolo , D. R. Kuhn , and R. Chandramouli . Role-Based Access Control . Artech House, Inc. , Norwood, MA, USA , 2003 . D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli. Role-Based Access Control. Artech House, Inc., Norwood, MA, USA, 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770351.1770421"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888917"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1478873.1478928"},{"key":"e_1_3_2_1_16_1","volume-title":"Foundations of Secure Computation","author":"Harrison M. A.","year":"1978","unstructured":"M. A. Harrison and W. L. Ruzzo . Monotonic protection systems . Foundations of Secure Computation , 1978 . M. A. Harrison and W. L. Ruzzo. Monotonic protection systems. Foundations of Secure Computation, 1978."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806517"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377867"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.22"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-008-0087-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70225"},{"key":"e_1_3_2_1_22_1","author":"Jha S.","year":"2004","unstructured":"S. Jha and T. W. Reps . Model Checking SPKI\/SDSI. Journal of Computer Security, 12(3--4):317--353 , 2004 . S. Jha and T. W. Reps. Model Checking SPKI\/SDSI. Journal of Computer Security, 12(3--4):317--353, 2004.","journal-title":"Journal of Computer Security, 12(3--4):317--353"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11691372_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1976.1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784781"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242664"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.07.021"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066100.1066103"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990058"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187441.1187442"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242663"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335341"},{"key":"e_1_3_2_1_33_1","unstructured":"NuSMV. http:\/\/nusmv.irst.itc.it\/.  NuSMV. http:\/\/nusmv.irst.itc.it\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2007.51"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884182"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.22"},{"key":"e_1_3_2_1_40_1","volume-title":"Policy analysis for administrative role based access control. Technical report","author":"Sasturkar A.","year":"2006","unstructured":"A. Sasturkar , P. Yang , S. D. Stoller , and C. Ramakrishnan . Policy analysis for administrative role based access control. Technical report , Stony Brook University , 2006 . A. Sasturkar, P. Yang, S. D. Stoller, and C. Ramakrishnan. Policy analysis for administrative role based access control. Technical report, Stony Brook University, 2006."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373257"},{"volume-title":"Personal communication","year":"2010","key":"e_1_3_2_1_42_1","unstructured":"Security Architect of a Leading Bank. Personal communication , 2010 . Security Architect of a Leading Bank. Personal communication, 2010."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.28"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301315"},{"key":"e_1_3_2_1_45_1","volume-title":"Computer Security - ESORICS","author":"Soshi M.","year":"2000","unstructured":"M. Soshi . Safety analysis of the dynamic-typed access matrix model . In Computer Security - ESORICS 2000 , LNCS, Springer Berlin \/ Heidelberg , 2000. M. Soshi. Safety analysis of the dynamic-typed access matrix model. In Computer Security - ESORICS 2000, LNCS, Springer Berlin \/ Heidelberg, 2000."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315300"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370684.1370685"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560647_25"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":48,"alternative-id":["10.1145\/2046707.2046727","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046727","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}