{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:11Z","timestamp":1763468291114,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":22,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB14H059"],"award-info":[{"award-number":["70NANB14H059"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1018711"],"award-info":[{"award-number":["CCF-1018711"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1145\/2790798.2790811","type":"proceedings-article","created":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T12:36:32Z","timestamp":1441715792000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of a Relationship Based Access Control Model"],"prefix":"10.1145","author":[{"given":"Phillipa","family":"Bennett","sequence":"first","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Robert","family":"France","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2790798.2790811-1","doi-asserted-by":"crossref","unstructured":"L. Bauer, S. Garriss, and M. K. Reiter. Detecting and resolving policy misconfigurations in access-control systems. ACM Transactions on Information Systems Security, 14(1):2, May 2011.","DOI":"10.1145\/1952982.1952984"},{"key":"key-10.1145\/2790798.2790811-2","doi-asserted-by":"crossref","unstructured":"G. Bruns, P. W. L. Fong, I. Siahaan, and M. Huth. Relationship-based access control: its expression and enforcement through hybrid logic. In E. Bertino and R. S. Sandhu, editors, CODASPY, pages 117--124. ACM, 2012.","DOI":"10.1145\/2133601.2133616"},{"key":"key-10.1145\/2790798.2790811-3","doi-asserted-by":"crossref","unstructured":"B. Carminati, E. Ferrari, and A. Perego. Enforcing access control in web-based social networks. ACM Transactions on Information Systems Security, 13(1), October 2009.","DOI":"10.1145\/1609956.1609962"},{"key":"key-10.1145\/2790798.2790811-4","doi-asserted-by":"crossref","unstructured":"B. Carminati, E. Ferrari, and A. Perego. Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur., 13(1), 2009.","DOI":"10.1145\/1609956.1609962"},{"key":"key-10.1145\/2790798.2790811-5","doi-asserted-by":"crossref","unstructured":"Y. Cheng, J. Park, and R. S. Sandhu. Relationship-based access control for online social networks: Beyond user-to-user relationships. In International Conference on Privacy, Security, Risk and Trust, PASSAT, and International Confernece on Social Computing, SocialCom, pages 646--655, Amsterdam, Netherlands, September 2012. IEEE.","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"key-10.1145\/2790798.2790811-6","doi-asserted-by":"crossref","unstructured":"Y. Cheng, J. Park, and R. S. Sandhu. Relationship-based access control for online social networks: Beyond user-to-user relationships. In SocialCom\/PASSAT, pages 646--655. IEEE, 2012.","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"key-10.1145\/2790798.2790811-7","doi-asserted-by":"crossref","unstructured":"Y. Cheng, J. Park, and R. S. Sandhu. A user-to-user relationship-based access control model for online social networks. In N. Cuppens-Boulahia, F. Cuppens, and J. Garc&#237;a-Alfaro, editors, DBSec, volume 7371 of Lecture Notes in Computer Science, pages 8--24. Springer, 2012.","DOI":"10.1007\/978-3-642-31540-4_2"},{"key":"key-10.1145\/2790798.2790811-8","doi-asserted-by":"crossref","unstructured":"J. Crampton and J. Sellwood. Path conditions and principal matching: a new approach to access control. In 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25-27, 2014, pages 187--198, 2014.","DOI":"10.1145\/2613087.2613094"},{"key":"key-10.1145\/2790798.2790811-9","doi-asserted-by":"crossref","unstructured":"M. Dammati and S. Mondal. Detecting policy misconfigurations in temporal domain using object priority. In Communication, Networks and Satellite (ComNetSat), 2012 IEEE International Conference on, pages 147--151, July 2012.","DOI":"10.1109\/ComNetSat.2012.6380795"},{"key":"key-10.1145\/2790798.2790811-10","unstructured":"T. Das, R. Bhagwan, and P. Naldurg. Baaz: A system for detecting access control misconfigurations. In USENIX Security Symposium, Security Symposium, pages 161--176, Washington DC, August 2010. USENIX Association."},{"key":"key-10.1145\/2790798.2790811-11","doi-asserted-by":"crossref","unstructured":"P. W. L. Fong. Relationship-based access control: protection model and policy language. In R. S. Sandhu and E. Bertino, editors, CODASPY, pages 191--202. ACM, 2011.","DOI":"10.1145\/1943513.1943539"},{"key":"key-10.1145\/2790798.2790811-12","unstructured":"C. E. Gates. Access control requirements for web 2.0 security and privacy. In IEEE Web 2.0 privacy and security workshop (W2SP'07), California, USA, May 2007."},{"key":"key-10.1145\/2790798.2790811-13","unstructured":"D. Jackson. Alloy 4.0 reference manual. http:\/\/alloy.mit.edu\/alloy\/documentation\/book-chapters\/alloy-language-reference.pdf, 2012."},{"key":"key-10.1145\/2790798.2790811-14","doi-asserted-by":"crossref","unstructured":"Y. Javed and M. Shehab. Access control policy misconfiguration detection in online social networks. In International Conference on Social Computing, SocialCom, pages 544--549. IEEE, September 2013.","DOI":"10.1109\/SocialCom.2013.82"},{"key":"key-10.1145\/2790798.2790811-15","doi-asserted-by":"crossref","unstructured":"M. L. Johnson, S. Egelman, and S. M. Bellovin. Facebook and privacy: it's complicated. In L. F. Cranor, editor, Symposium On Usable Privacy and Security, SOUPS, page 9. ACM, July 2012.","DOI":"10.1145\/2335356.2335369"},{"key":"key-10.1145\/2790798.2790811-16","doi-asserted-by":"crossref","unstructured":"M. Madejski, M. L. Johnson, and S. M. Bellovin. A study of privacy settings errors in an online social network. In IEEE International Conference on Pervasive Computing and Commonications, PerCom, Workshops, pages 340--345. IEEE, March 2012.","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"key-10.1145\/2790798.2790811-17","unstructured":"P. Naldurg, R. Bhagwan, and T. Das. Understanding policy intent and misconfigurations from implementations: Consistency and convergence. (Short Paper) The 8th International Workshop on Formal Aspects of Security and Trust, September 2011."},{"key":"key-10.1145\/2790798.2790811-18","doi-asserted-by":"crossref","unstructured":"A. C. Squicciarini, H. Xu, and X. L. Zhang. Cope: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology, JASIST, 62(3):521--534, March 2011.","DOI":"10.1002\/asi.21473"},{"key":"key-10.1145\/2790798.2790811-19","doi-asserted-by":"crossref","unstructured":"N. Zhang, M. Ryan, and D. Guelev. Evaluating access control policies through model checking. In J. Zhou, J. Lopez, R. Deng, and F. Bao, editors, Information Security, volume 3650 of Lecture Notes in Computer Science, pages 446--460. Springer Berlin Heidelberg, 2005.","DOI":"10.1007\/11556992_32"},{"key":"key-10.1145\/2790798.2790811-20","doi-asserted-by":"crossref","unstructured":"R. Zhang. Relation Based Access Control, volume 5 of Studies on the Semantic Web. IOS Press, 2010.","DOI":"10.3233\/978-1-61499-339-1-i"},{"key":"key-10.1145\/2790798.2790811-21","unstructured":"R. Zhang, A. Artale, F. Giunchiglia, and B. Crispo. Using description logics in relation based access control. In B. C. Grau, I. Horrocks, B. Motik, and U. Sattler, editors, Description Logics, volume 477 of CEUR Workshop Proceedings. CEUR-WS.org, 2009."},{"key":"key-10.1145\/2790798.2790811-22","doi-asserted-by":"crossref","unstructured":"R. Zhang, F. Giunchiglia, B. Crispo, and L. Song. Relation-based access control: An access control model for context-aware computing environment. Wireless Personal Communications, 55(1):5--17, 2010.","DOI":"10.1007\/s11277-009-9782-4"}],"event":{"number":"8","sponsor":["BytePress","Keio University"],"acronym":"C3S2E '15","name":"the Eighth International C* Conference","start":{"date-parts":[[2015,7,13]]},"location":"Yokohama, Japan","end":{"date-parts":[[2015,7,15]]}},"container-title":["Proceedings of the Eighth International C* Conference on Computer Science &amp; Software Engineering - C3S2E '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2790798.2790811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2790811&amp;ftid=1617552&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:46Z","timestamp":1750223266000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2790798.2790811"}},"subtitle":[],"proceedings-subject":"Computer Science & Software Engineering","short-title":[],"issued":{"date-parts":[[2008]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1145\/2790798.2790811","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}