{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:18:09Z","timestamp":1771042689450,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2133601.2133616","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"117-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Relationship-based access control"],"prefix":"10.1145","author":[{"given":"Glenn","family":"Bruns","sequence":"first","affiliation":[{"name":"Bell Labs, Alcatel-Lucent, Naperville, IL, USA"}]},{"given":"Philip W.L.","family":"Fong","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Ida","family":"Siahaan","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Michael","family":"Huth","sequence":"additional","affiliation":[{"name":"Imperial College London, London, England UK"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/155183.155225"},{"key":"e_1_3_2_1_3_1","volume-title":"Handbook of Modal Logic","author":"Areces C.","year":"2007","unstructured":"C. Areces and B. ten Cate. Hybrid logics . In P. Blackburn, J. van Benthem, and F. Wolter, editors, Handbook of Modal Logic . Elsevier , 2007 . C. Areces and B. ten Cate. Hybrid logics. In P. Blackburn, J. van Benthem, and F. Wolter, editors, Handbook of Modal Logic. Elsevier, 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952991"},{"key":"e_1_3_2_1_5_1","volume-title":"A logic for reasoning about time-dependent access control policies","author":"DeYoung H.","year":"2008","unstructured":"H. DeYoung . A logic for reasoning about time-dependent access control policies . Senior Research Thesis Carnegie Mellon University-CS-08--131, School of Computer Science, Carnegie Mellon University , 20 May 2008 . H. DeYoung. A logic for reasoning about time-dependent access control policies. Senior Research Thesis Carnegie Mellon University-CS-08--131, School of Computer Science, Carnegie Mellon University, 20 May 2008."},{"key":"e_1_3_2_1_6_1","unstructured":"Facebook 2011. http:\/\/www.facebook.com\/about\/privacy\/your-info-on-fb#controlprofile.  Facebook 2011. http:\/\/www.facebook.com\/about\/privacy\/your-info-on-fb#controlprofile."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.16"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813110"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998450"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792803.1792819"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of IEEE Web 2.0 Privacy and Security Workshop (W2SP'07)","author":"Gates C. E.","year":"2007","unstructured":"C. E. Gates . Access control requirements for Web 2.0 security and privacy . In Proc. of IEEE Web 2.0 Privacy and Security Workshop (W2SP'07) , Oakland, California , May 2007 . C. E. Gates. Access control requirements for Web 2.0 security and privacy. In Proc. of IEEE Web 2.0 Privacy and Security Workshop (W2SP'07), Oakland, California, May 2007."}],"event":{"name":"CODASPY'12: Second ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA","acronym":"CODASPY'12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the second ACM conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133616","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2133601.2133616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:52Z","timestamp":1750241152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133616"}},"subtitle":["its expression and enforcement through hybrid logic"],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":11,"alternative-id":["10.1145\/2133601.2133616","10.1145\/2133601"],"URL":"https:\/\/doi.org\/10.1145\/2133601.2133616","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}