{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:19Z","timestamp":1750306879084,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T00:00:00Z","timestamp":1370995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,12]]},"DOI":"10.1145\/2462410.2462413","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"137-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Heuristic safety analysis of access control models"],"prefix":"10.1145","author":[{"given":"Peter","family":"Amthor","sequence":"first","affiliation":[{"name":"Ilmenau University of Technology, Ilmenau, Germany"}]},{"given":"Winfried E.","family":"K\u00fchnhauser","sequence":"additional","affiliation":[{"name":"Ilmenau University of Technology, Ilmenau, Germany"}]},{"given":"Anja","family":"P\u00f6lck","sequence":"additional","affiliation":[{"name":"Ilmenau University of Technology, Ilmenau, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966935"},{"key":"e_1_3_2_1_4_1","first-page":"206","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"David","year":"1989","unstructured":"David F.C. Brewer and Michael J. Nash. The Chinese Wall Security Policy . In Proc. IEEE Symposium on Security and Privacy , pages 206 -- 214 . IEEE Press , May 1989 . David F.C. Brewer and Michael J. Nash. The Chinese Wall Security Policy. In Proc. IEEE Symposium on Security and Privacy, pages 206--214. IEEE Press, May 1989."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/794196.795045"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. 2nd Workshop on Australasian Information Security, Conferences in Research and Practice in Information Technology","volume":"32","author":"Evered Mark","year":"2004","unstructured":"Mark Evered and Serge B\u00f6geholz . A Case Study in Access Control Requirements for a Health Information System . In Proc. 2nd Workshop on Australasian Information Security, Conferences in Research and Practice in Information Technology , Vol. 32 , ACSW Frontiers '04, pages 53--61, Darlinghurst, Australia, Australia , 2004 . Australian Computer Society, Inc. Mark Evered and Serge B\u00f6geholz. A Case Study in Access Control Requirements for a Health Information System. In Proc. 2nd Workshop on Australasian Information Security, Conferences in Research and Practice in Information Technology, Vol. 32, ACSW Frontiers '04, pages 53--61, Darlinghurst, Australia, Australia, 2004. Australian Computer Society, Inc."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352624"},{"key":"e_1_3_2_1_8_1","unstructured":"Mikhail I. Gofman C.R. Ramakrishnan Scott D. Stoller and Ping Yang. Parameterized RBAC and ARBAC Policies for a Small Health Care Facility. http:\/\/www.cs.stonybrook.edu\/~stoller\/parbac\/healthcare.txt 2009. {Online; accessed 24-August-2011}.  Mikhail I. Gofman C.R. Ramakrishnan Scott D. Stoller and Ping Yang. Parameterized RBAC and ARBAC Policies for a Small Health Care Facility. http:\/\/www.cs.stonybrook.edu\/~stoller\/parbac\/healthcare.txt 2009. {Online; accessed 24-August-2011}."},{"key":"e_1_3_2_1_9_1","first-page":"337","volume-title":"R. DeMillo","author":"Harrison Michael A.","year":"1978","unstructured":"Michael A. Harrison and Walter L. Ruzzo . Monotonic Protection Systems . In R. DeMillo , D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 337 -- 365 . Academic Press , 1978 . Michael A. Harrison and Walter L. Ruzzo. Monotonic Protection Systems. In R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 337--365. Academic Press, 1978."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067629.806517"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046727"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(94)90033-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937528"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.05.032"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25560-1_27"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(78)90029-2"},{"key":"e_1_3_2_1_19_1","first-page":"367","volume-title":"R. DeMillo","author":"Lipton R.","year":"1978","unstructured":"R. Lipton and L. Snyder . On Synchronization and Security . In R. DeMillo , D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 367 -- 385 . Academic Press , 1978 . R. Lipton and L. Snyder. On Synchronization and Security. In R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 367--385. Academic Press, 1978."},{"key":"e_1_3_2_1_20_1","first-page":"29","volume-title":"2001 USENIX Annual Technical Conference","author":"Peter","year":"2001","unstructured":"Peter A. Loscocco and Stephen D. Smalley. Integrating Flexible Support for Security Policies into the Linux Operating System. In Clem Cole, editor , 2001 USENIX Annual Technical Conference , pages 29 -- 42 , 2001 . Peter A. Loscocco and Stephen D. Smalley. Integrating Flexible Support for Security Policies into the Linux Operating System. In Clem Cole, editor, 2001 USENIX Annual Technical Conference, pages 29--42, 2001."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187441.1187442"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(77)90007-8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542214"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.02.018"},{"key":"e_1_3_2_1_25_1","first-page":"122","volume-title":"Sandhu. The Typed Access Matrix Model. In Proc. IEEE Symposium on Security and Privacy","author":"Ravi","year":"1992","unstructured":"Ravi S. Sandhu. The Typed Access Matrix Model. In Proc. IEEE Symposium on Security and Privacy , pages 122 -- 136 . IEEE, May 1992 . Ravi S. Sandhu. The Typed Access Matrix Model. In Proc. IEEE Symposium on Security and Privacy, pages 122--136. IEEE, May 1992."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542233"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.002"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315300"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.22"},{"key":"e_1_3_2_1_32_1","first-page":"285","volume-title":"In USENIX Annual Technical Conference","author":"Watson Robert","year":"2003","unstructured":"Robert Watson and Chris Vance . The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 . In In USENIX Annual Technical Conference , pages 285 -- 296 , 2003 . Robert Watson and Chris Vance. The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0. In In USENIX Annual Technical Conference, pages 285--296, 2003."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066760"}],"event":{"name":"SACMAT '13: 18th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Amsterdam The Netherlands","acronym":"SACMAT '13"},"container-title":["Proceedings of the 18th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462410.2462413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462410.2462413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:29Z","timestamp":1750234709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462410.2462413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,12]]},"references-count":31,"alternative-id":["10.1145\/2462410.2462413","10.1145\/2462410"],"URL":"https:\/\/doi.org\/10.1145\/2462410.2462413","relation":{},"subject":[],"published":{"date-parts":[[2013,6,12]]},"assertion":[{"value":"2013-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}