{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:33:51Z","timestamp":1757777631107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2133601.2133623","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"169-180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Quantitative access control with partially-observable Markov decision processes"],"prefix":"10.1145","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[{"name":"IIT-CNR, Pisa, Italy"}]},{"given":"Charles","family":"Morisset","sequence":"additional","affiliation":[{"name":"IIT-CNR, Pisa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"254","volume-title":"T. Grandison, S. Jajodia, and P. Samarati. Regulating exceptions in healthcare using policy spaces. In Proceeedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security","author":"Ardagna C.","year":"2008","unstructured":"C. Ardagna , S. Capitani Di Vimercati , T. Grandison, S. Jajodia, and P. Samarati. Regulating exceptions in healthcare using policy spaces. In Proceeedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security , pages 254 -- 267 , Berlin, Heidelberg , 2008 . Springer-Verlag . 10.1007\/978-3-540-70567-3_20 C. Ardagna, S. Capitani Di Vimercati, T. Grandison, S. Jajodia, and P. Samarati. Regulating exceptions in healthcare using policy spaces. In Proceeedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 254--267, Berlin, Heidelberg, 2008. Springer-Verlag. 10.1007\/978-3-540-70567-3_20"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2692141.2692146"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1512\/iumj.1957.6.56038"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.10"},{"key":"e_1_3_2_1_5_1","volume-title":"Optimal policies for partially observable markov decision processes. Technical report","author":"Cassandra A. R.","year":"1994","unstructured":"A. R. Cassandra . Optimal policies for partially observable markov decision processes. Technical report , Brown University , Providence, RI, USA , 1994 . A. R. Cassandra. Optimal policies for partially observable markov decision processes. Technical report, Brown University, Providence, RI, USA, 1994."},{"key":"e_1_3_2_1_6_1","first-page":"1023","volume-title":"Proceedings of the Twelfth National Conference on Artificial Intelligence (AAAI-94)","volume":"2","author":"Cassandra A. R.","year":"1994","unstructured":"A. R. Cassandra , L. P. Kaelbling , and M. L. Littman . Acting Optimally in Partially Observable Stochastic Domains . In Proceedings of the Twelfth National Conference on Artificial Intelligence (AAAI-94) , volume 2 , pages 1023 -- 1028 , Seattle, Washington, USA , 1994 . AAAI Press\/MIT Press. A. R. Cassandra, L. P. Kaelbling, and M. L. Littman. Acting Optimally in Partially Observable Stochastic Domains. In Proceedings of the Twelfth National Conference on Artificial Intelligence (AAAI-94), volume 2, pages 1023--1028, Seattle, Washington, USA, 1994. AAAI Press\/MIT Press."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29963-6_11"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063986"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"J.\n      Crampton\n     and \n      M.\n      Huth\n  . \n  An authorization framework resilient to policy evaluation failures\n  . In D. Gritzalis B. Preneel and M. Theoharidou editors ESORICS volume \n  6345\n   of \n  Lecture Notes in Computer Science pages \n  472\n  --\n  487\n  . \n  Springer 2010\n  .   J. Crampton and M. Huth. An authorization framework resilient to policy evaluation failures. In D. Gritzalis B. Preneel and M. Theoharidou editors ESORICS volume 6345 of Lecture Notes in Computer Science pages 472--487. Springer 2010.","DOI":"10.1007\/978-3-642-15497-3_29"},{"key":"e_1_3_2_1_11_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Security and Trust Management - 6th International Workshop, STM","author":"Crampton J.","year":"2010","unstructured":"J. Crampton and C. Morisset . An auto-delegation mechanism for access control systems . In Security and Trust Management - 6th International Workshop, STM 2010 , Athens, Greece, September 23--24, 2010, Revised Selected Papers, volume 6710 of Lecture Notes in Computer Science , pages 1 -- 16 . Springer , 2011. J. Crampton and C. Morisset. An auto-delegation mechanism for access control systems. In Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23--24, 2010, Revised Selected Papers, volume 6710 of Lecture Notes in Computer Science, pages 1--16. Springer, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.30"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECUMN.2007.19"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on","author":"He H.","year":"2009","unstructured":"H. He , Y. Shuping , and P. Wu . Security decision making based on domain partitional markov decision process . In Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on , pages 1 -- 4 , dec. 2009 . H. He, Y. Shuping, and P. Wu. Security decision making based on domain partitional markov decision process. In Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on, pages 1--4, dec. 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2007.364201"},{"key":"e_1_3_2_1_16_1","first-page":"689","volume-title":"What makes some pomdp problems easy to approximate? In J","author":"Hsu D.","year":"2008","unstructured":"D. Hsu , W. S. Lee , and N. Rong . What makes some pomdp problems easy to approximate? In J . Platt, D. Koller, Y. Singer, and S. Roweis, editors, Advances in Neural Information Processing Systems 20, pages 689 -- 696 . MIT Press , Cambridge, MA, 2008 . D. Hsu, W. S. Lee, and N. Rong. What makes some pomdp problems easy to approximate? In J. Platt, D. Koller, Y. Singer, and S. Roweis, editors, Advances in Neural Information Processing Systems 20, pages 689--696. MIT Press, Cambridge, MA, 2008."},{"key":"e_1_3_2_1_17_1","first-page":"213","volume-title":"Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis","author":"Jaume M.","year":"2006","unstructured":"M. Jaume and C. Morisset . Towards a formal specification of access control. In P. Degano, R. Kusters, L. Vigano, and S. Zdancewic, editors , Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis , pages 213 -- 232 , 2006 . M. Jaume and C. Morisset. Towards a formal specification of access control. In P. Degano, R. Kusters, L. Vigano, and S. Zdancewic, editors, Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, pages 213--232, 2006."},{"key":"e_1_3_2_1_18_1","volume-title":"International Workshop, POLICY'11 Pisa","author":"Kephart J.","year":"2011","unstructured":"J. Kephart . The utility of utility: Policies for self-managing systems. In Policies for Distributed Systems and Networks , International Workshop, POLICY'11 Pisa , Italy , 2011 . To appear. J. Kephart. The utility of utility: Policies for self-managing systems. In Policies for Distributed Systems and Networks, International Workshop, POLICY'11 Pisa, Italy, 2011. To appear."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 6th International Workshop on Security and Trust Management. Springer","author":"Krautsevich L.","year":"2010","unstructured":"L. Krautsevich , A. Lazouski , F. Martinelli , and A. Yautsiukhin . Influence of attribute freshness on decision making in usage control . In Proceedings of the 6th International Workshop on Security and Trust Management. Springer , 2010 . L. Krautsevich, A. Lazouski, F. Martinelli, and A. Yautsiukhin. Influence of attribute freshness on decision making in usage control. In Proceedings of the 6th International Workshop on Security and Trust Management. Springer, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2010.13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2010.46"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 4th SETOP International Workshop on Autonomous and Spontaneous Security. LNCS","author":"Krautsevich L.","year":"2011","unstructured":"L. Krautsevich , F. Martinelli , C. Morisset , and A. Yautsiukhin . Risk-based auto-delegation for probabilistic availability . In Proceedings of the 4th SETOP International Workshop on Autonomous and Spontaneous Security. LNCS , 2011 . to appear. L. Krautsevich, F. Martinelli, C. Morisset, and A. Yautsiukhin. Risk-based auto-delegation for probabilistic availability. In Proceedings of the 4th SETOP International Workshop on Autonomous and Spontaneous Security. LNCS, 2011. to appear."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542603"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456396.1456402"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943526"},{"key":"e_1_3_2_1_26_1","first-page":"437","volume-title":"Protection. In Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems","author":"Lampson B.","year":"1971","unstructured":"B. Lampson . Protection. In Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems , pages 437 -- 443 , Princeton University , 1971 . B. Lampson. Protection. In Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, pages 437--443, Princeton University, 1971."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353659"},{"key":"e_1_3_2_1_28_1","first-page":"541","volume-title":"Proceedings of AAAI '99\/IAAI '99","author":"Madani O.","year":"1999","unstructured":"O. Madani , S. Hanks , and A. Condon . On the undecidability of probabilistic planning and infinite-horizon partially observable markov decision problems . In Proceedings of AAAI '99\/IAAI '99 , pages 541 -- 548 , Menlo Park, CA, USA , 1999 . American Association for Artificial Intelligence. O. Madani, S. Hanks, and A. Condon. On the undecidability of probabilistic planning and infinite-horizon partially observable markov decision problems. In Proceedings of AAAI '99\/IAAI '99, pages 541--548, Menlo Park, CA, USA, 1999. American Association for Artificial Intelligence."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595694"},{"key":"e_1_3_2_1_31_1","unstructured":"T. Moses. eXtensible Access Control Markup Language TC v2.0 (XACML) Feb. 2005.  T. Moses. eXtensible Access Control Markup Language TC v2.0 (XACML) Feb. 2005."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533097"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755719"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.12.3.441"},{"key":"e_1_3_2_1_35_1","volume-title":"Anytime point-based approximations for large pomdps. J. Artif. Intell. Res. (JAIR), 27:335--380","author":"Pineau J.","year":"2006","unstructured":"J. Pineau , G. J. Gordon , and S. Thrun . Anytime point-based approximations for large pomdps. J. Artif. Intell. Res. (JAIR), 27:335--380 , 2006 . J. Pineau, G. J. Gordon, and S. Thrun. Anytime point-based approximations for large pomdps. J. Artif. Intell. Res. (JAIR), 27:335--380, 2006."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0148-8"},{"key":"e_1_3_2_1_37_1","volume-title":"The Optimal Control of Partially Observable Markov Processes Over a Finite Horizon. Operations Research, 21(5)","author":"Smallwood R. D.","year":"1973","unstructured":"R. D. Smallwood and E. J. Sondik . The Optimal Control of Partially Observable Markov Processes Over a Finite Horizon. Operations Research, 21(5) , 1973 . R. D. Smallwood and E. J. Sondik. The Optimal Control of Partially Observable Markov Processes Over a Finite Horizon. Operations Research, 21(5), 1973."},{"key":"e_1_3_2_1_38_1","first-page":"520","volume-title":"Proceedings of the 20th Conference in Uncertainty in Artificial Intelligence, July 7--11 2004","author":"Smith T.","year":"2004","unstructured":"T. Smith and R. G. Simmons . Heuristic search value iteration for pomdps . In Proceedings of the 20th Conference in Uncertainty in Artificial Intelligence, July 7--11 2004 , pages 520 -- 527 , 2004 . T. Smith and R. G. Simmons. Heuristic search value iteration for pomdps. In Proceedings of the 20th Conference in Uncertainty in Artificial Intelligence, July 7--11 2004, pages 520--527, 2004."},{"key":"e_1_3_2_1_39_1","volume-title":"Perseus: Randomized point-based value iteration for pomdps. J. Artif. Intell. Res. (JAIR), 24:195--220","author":"Spaan M. T. J.","year":"2005","unstructured":"M. T. J. Spaan and N. A. Vlassis . Perseus: Randomized point-based value iteration for pomdps. J. Artif. Intell. Res. (JAIR), 24:195--220 , 2005 . M. T. J. Spaan and N. A. Vlassis. Perseus: Randomized point-based value iteration for pomdps. J. Artif. Intell. Res. (JAIR), 24:195--220, 2005."},{"volume-title":"State of security survey","year":"2011","key":"e_1_3_2_1_40_1","unstructured":"Symantec. State of security survey , 2011 . http:\/\/www.symantec.com\/content\/en\/us\/about\/media\/pdfs\/symc_state_of_security_2011.pdf. Symantec. State of security survey, 2011. http:\/\/www.symantec.com\/content\/en\/us\/about\/media\/pdfs\/symc_state_of_security_2011.pdf."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030093"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393847.2393857"}],"event":{"name":"CODASPY'12: Second ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'12"},"container-title":["Proceedings of the second ACM conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2133601.2133623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:52Z","timestamp":1750241152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":41,"alternative-id":["10.1145\/2133601.2133623","10.1145\/2133601"],"URL":"https:\/\/doi.org\/10.1145\/2133601.2133623","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}