{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381862","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"764-770","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparison of policy specification languages for access control"],"prefix":"10.1145","author":[{"given":"Sarnali","family":"Saha","sequence":"first","affiliation":[{"name":"Jadavpur University, Jadavpur, Kolkata, India"}]},{"given":"Asmita","family":"Nag","sequence":"additional","affiliation":[{"name":"Jadavpur University, Jadavpur, Kolkata, India"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"18","volume":"1995","author":"Nicodemos Damianou","year":"2001","journal-title":"The Ponder Policy Specification Language. LNCS"},{"key":"e_1_3_2_1_2_1","first-page":"88","volume-title":"Hitchens and Vijay Varadharajan. Tower: A Language for Role Based Access Control. In POLICY '01: Proceedings of the International Workshop on Policies for Distributed Systems and Networks","author":"Michael","year":"2001"},{"volume-title":"University of California","year":"2000","author":"James A.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884380"},{"volume-title":"The RCL 2000 language for specifying role-based authorization constraints. PhD thesis","year":"1999","author":"Ahn","key":"e_1_3_2_1_5_1"},{"volume-title":"Proceedings of the AAMAS 03 workshop on Web Services and Agent-Based Engineering","year":"2003","author":"Johnson M.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Mary Ellen Zurko Rich Simon Tom Sanfilippo Mary Ellen. A User-Centered Modular Authorization Service Built on an RBAC Foundation 1999  Mary Ellen Zurko Rich Simon Tom Sanfilippo Mary Ellen. A User-Centered Modular Authorization Service Built on an RBAC Foundation 1999"},{"volume-title":"University of Bremen","year":"2007","author":"Christopher Alm ORKA","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.345822"},{"key":"e_1_3_2_1_10_1","unstructured":"Paul Ashley Satoshi Hada Guenter Karjoth Calvin Powers and Matthias Schunter. Enterprise privacy authorization language (epal 1.2) 2003.  Paul Ashley Satoshi Hada Guenter Karjoth Calvin Powers and Matthias Schunter. Enterprise privacy authorization language (epal 1.2) 2003."},{"key":"e_1_3_2_1_11_1","unstructured":"http:\/\/www.rbjones.com\/rbjpub\/cs\/csfm03.htm  http:\/\/www.rbjones.com\/rbjpub\/cs\/csfm03.htm"},{"key":"e_1_3_2_1_12_1","unstructured":"OASIS (Organization for the Advancement of Structured Information Standards).XACML Language Proposal.  OASIS (Organization for the Advancement of Structured Information Standards).XACML Language Proposal."},{"key":"e_1_3_2_1_13_1","unstructured":"The Alloy Analyzer. Project homepage http:\/\/alloy.mit.edu\/  The Alloy Analyzer. Project homepage http:\/\/alloy.mit.edu\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_27"},{"key":"e_1_3_2_1_15_1","unstructured":"Lalana Kagal. A Policy Language for the Me-Centric Project 2002.  Lalana Kagal. A Policy Language for the Me-Centric Project 2002."},{"key":"e_1_3_2_1_16_1","unstructured":"Carlos Ribeiro Andre Zuquete Paulo Ferreira and Paulo Guedes.SPL: An access control language for security policies with complex constraints.  Carlos Ribeiro Andre Zuquete Paulo Ferreira and Paulo Guedes.SPL: An access control language for security policies with complex constraints."}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381862","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":16,"alternative-id":["10.1145\/2381716.2381862","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381862","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}