{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:26:43Z","timestamp":1759091203479,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557578","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"127-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Interaction provenance model for unified authentication factors in service oriented computing"],"prefix":"10.1145","author":[{"given":"Ragib","family":"Hasan","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Rasib","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"107","volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium","author":"Abadi M.","year":"2003","unstructured":"M. Abadi and C. Fournet . Access control based on execution history . In Proceedings of the 10th Annual Network and Distributed System Security Symposium , pages 107 -- 121 , 2003 . M. Abadi and C. Fournet. Access control based on execution history. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 107--121, 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"The Art and Science of Computer Security","author":"Bishop M. A.","year":"2002","unstructured":"M. A. Bishop . The Art and Science of Computer Security . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2002 . M. A. Bishop. The Art and Science of Computer Security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180427"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of The 3rd USENIX Workshop on Hot Topics in Security (HotSec)","author":"Braun U.","year":"2008","unstructured":"U. Braun , A. Shinnar , and M. Seltzer . Securing provenance . In Proceedings of The 3rd USENIX Workshop on Hot Topics in Security (HotSec) , July 2008 . U. Braun, A. Shinnar, and M. Seltzer. Securing provenance. In Proceedings of The 3rd USENIX Workshop on Hot Topics in Security (HotSec), July 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.26"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"First workshop on on Theory and practice of provenance, TAPP'09","author":"Chong S.","year":"2009","unstructured":"S. Chong . Towards semantics for provenance security . In First workshop on on Theory and practice of provenance, TAPP'09 , pages 2: 1 -- 2 :5, Berkeley, CA, USA , 2009 . USENIX Association. S. Chong. Towards semantics for provenance security. In First workshop on on Theory and practice of provenance, TAPP'09, pages 2:1--2:5, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288102"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314313.1314318"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629080.1629082"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370684.1370686"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557578","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":10,"alternative-id":["10.1145\/2557547.2557578","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557578","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}