{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:13Z","timestamp":1750308553912,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Nation Basic Research Program (973 Program) of China","award":["2015CB352201"],"award-info":[{"award-number":["2015CB352201"]}]},{"name":"JSPS Grant-in-Aid for Scientific Research (A) in Japan","award":["25240009"],"award-info":[{"award-number":["25240009"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1145\/2752952.2752963","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"185-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards Attribute-Based Authorisation for Bidirectional Programming"],"prefix":"10.1145","author":[{"given":"Lionel","family":"Montrieux","sequence":"first","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan"}]},{"given":"Zhenjiang","family":"Hu","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2015,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39715-1_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863572"},{"key":"e_1_3_2_1_3_1","volume-title":"Introduction to Functional Programming using Haskell","author":"Bird R.","year":"1998","unstructured":"R. Bird . Introduction to Functional Programming using Haskell . Prentice Hall , London; New York , 2 nd edition, May 1998 . R. Bird. Introduction to Functional Programming using Haskell. Prentice Hall, London; New York, 2nd edition, May 1998.","edition":"2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328487"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02408-5_19"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5695-3_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1378307.1378324"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007634"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.25"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376916.1376954"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040325"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/863742.863764"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968567"},{"key":"e_1_3_2_1_16_1","volume-title":"First international workshop on bidirectional transformations (BX 2012)","author":"Hermann F.","year":"2012","unstructured":"F. Hermann and J. Voigtl\u00e4nder . First international workshop on bidirectional transformations (BX 2012) : Preface. Electronic Communications of the EASST, 49(0 ), July 2012 . F. Hermann and J. Voigtl\u00e4nder. First international workshop on bidirectional transformations (BX 2012): Preface. Electronic Communications of the EASST, 49(0), July 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863573"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103715"},{"key":"e_1_3_2_1_19_1","first-page":"466","volume-title":"Towards co-evolution in model-driven development via bidirectional higher-order transformation","author":"Hoisl B.","year":"2014","unstructured":"B. Hoisl , Z. Hu , and S. Hidaka . Towards co-evolution in model-driven development via bidirectional higher-order transformation . pages 466 -- 471 , Jan. 2014 . B. Hoisl, Z. Hu, and S. Hidaka. Towards co-evolution in model-driven development via bidirectional higher-order transformation. pages 466--471, Jan. 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Z.\n      Hu H.\n      Pacheco and \n      S.\n      Fischer\n  . \n  Validity checking of putback transformations in bidirectional programming\n  . In C. Jones P. Pihlajasaari and J. Sun editors FM \n  2014\n  : Formal Methods number 8442 in \n  Lecture Notes in Computer Science pages \n  1\n  --\n  15\n  . \n  Springer Jan. 2014.  Z. Hu H. Pacheco and S. Fischer. Validity checking of putback transformations in bidirectional programming. In C. Jones P. Pihlajasaari and J. Sun editors FM 2014: Formal Methods number 8442 in Lecture Notes in Computer Science pages 1--15. Springer Jan. 2014.","DOI":"10.1007\/978-3-319-06410-9_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352613"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27696-0_4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063994"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250752"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-009-0124-3"},{"key":"e_1_3_2_1_26_1","volume-title":"Jan.","author":"OASIS.","year":"2013","unstructured":"OASIS. eXtensible access control markup language (XACML) version 3.0 , Jan. 2013 . OASIS. eXtensible access control markup language (XACML) version 3.0, Jan. 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2643135.2643141"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754239.1754245"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35697-6_11"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462424"},{"key":"e_1_3_2_1_31_1","volume-title":"Feb.","author":"C.","year":"2004","unstructured":"W3 C. OWL web ontology language reference , Feb. 2004 . W3C. OWL web ontology language reference, Feb. 2004."},{"key":"e_1_3_2_1_32_1","volume-title":"Jan.","author":"C.","year":"2007","unstructured":"W3 C. XSL transformations (XSLT) version 2.0 , Jan. 2007 . W3C. XSL transformations (XSLT) version 2.0, Jan. 2007."},{"key":"e_1_3_2_1_33_1","volume-title":"Apr.","author":"C.","year":"2014","unstructured":"W3 C. XML XPath language (XPath) 3.0 , Apr. 2014 . W3C. XML XPath language (XPath) 3.0, Apr. 2014."},{"key":"e_1_3_2_1_34_1","volume-title":"Apr.","author":"C.","year":"2014","unstructured":"W3 C. XQuery 3.0 : An XML query language , Apr. 2014 . W3C. XQuery 3.0: An XML query language, Apr. 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337287"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591102"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8070-0_24"}],"event":{"name":"SACMAT '15: 20th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"SACMAT '15"},"container-title":["Proceedings of the 20th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2752952.2752963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2752952.2752963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:52Z","timestamp":1750273432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2752952.2752963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":36,"alternative-id":["10.1145\/2752952.2752963","10.1145\/2752952"],"URL":"https:\/\/doi.org\/10.1145\/2752952.2752963","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]},"assertion":[{"value":"2015-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}