{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:31Z","timestamp":1750306771273,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,4]],"date-time":"2013-04-04T00:00:00Z","timestamp":1365033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,4]]},"DOI":"10.1145\/2498328.2500080","type":"proceedings-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T14:33:48Z","timestamp":1372775628000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Consistency checking in privacy-aware access control"],"prefix":"10.1145","author":[{"given":"Anja","family":"Remshagen","sequence":"first","affiliation":[{"name":"University of West Georgia, Carrollton, Georgia"}]}],"member":"320","published-online":{"date-parts":[[2013,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.199"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809866"},{"key":"e_1_3_2_1_3_1","unstructured":"Biere A. Heule M. Van Maaren H. Walsh T. 2009. Handbook of Satisfiability. Frontiers in Artificial Intelligence and Applications 185. IOS Press.   Biere A. Heule M. Van Maaren H. Walsh T. 2009. Handbook of Satisfiability . Frontiers in Artificial Intelligence and Applications 185. IOS Press."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0023-0"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882992.1883093"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805980"},{"volume-title":"12th European Symposium On Research In Computer Security (Dresden, Germany, September 2007). ESORICS 2007. 72--89","author":"Ni Q.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"}],"event":{"name":"ACM SE'13: ACM Southeast Regional 2013","sponsor":["ACM Association for Computing Machinery"],"location":"Savannah Georgia","acronym":"ACM SE'13"},"container-title":["Proceedings of the 51st ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2498328.2500080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2498328.2500080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:56Z","timestamp":1750231736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2498328.2500080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,4]]},"references-count":10,"alternative-id":["10.1145\/2498328.2500080","10.1145\/2498328"],"URL":"https:\/\/doi.org\/10.1145\/2498328.2500080","relation":{},"subject":[],"published":{"date-parts":[[2013,4,4]]},"assertion":[{"value":"2013-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}