{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:25:15Z","timestamp":1767374715238,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T00:00:00Z","timestamp":1521676800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1111925, CNS-1423481, CNS-1538418"],"award-info":[{"award-number":["CNS-1111925, CNS-1423481, CNS-1538418"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["W911NF-15-1-0518"],"award-info":[{"award-number":["W911NF-15-1-0518"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3029806.3029828","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T08:34:59Z","timestamp":1489998899000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Classifying and Comparing Attribute-Based and Relationship-Based Access Control"],"prefix":"10.1145","author":[{"given":"Tahmina","family":"Ahmed","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, Sanantonio, TX, USA"}]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, Sanantonio, TX, USA"}]},{"given":"Jaehong","family":"Park","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, Huntsville, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alloy language and tool. http:\/\/alloy.mit.edu\/alloy\/. Accessed 09\/2016."},{"key":"e_1_3_2_1_2_1","volume-title":"Extensible access control markup language (XACML), v2.0","author":"OASIS","year":"2005","unstructured":"OASIS, Extensible access control markup language (XACML), v2.0 (2005)."},{"key":"e_1_3_2_1_3_1","unstructured":"Openstack. http:\/\/www.openstack.org\/software\/mitaka. Accessed 09\/2016."},{"key":"e_1_3_2_1_4_1","unstructured":"Singlevalue multivalue. https:\/\/msdn.microsoft.com\/en-us\/library\/aa746488(v=vs.85).aspx. Accessed 09\/2016."},{"key":"e_1_3_2_1_5_1","unstructured":"Structured attribute. https:\/\/docops.ca.com\/ca-identity-manager\/12--6--5\/en\/configuring\/user-console-design\/configuring-profile-tabs-and-screens\/field-styles\/structured-attribute-display. Accessed 09\/2016."},{"key":"e_1_3_2_1_6_1","unstructured":"Swift. http:\/\/docs.openstack.org\/developer\/swift\/. Accessed 09\/2016."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2016.47"},{"key":"e_1_3_2_1_8_1","first-page":"6","volume-title":"Category theory for computing science","author":"Barr M.","year":"1998","unstructured":"M. Barr and C. Wells. Category theory for computing science. In Prentice Hall, page 6, 1998."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2790798.2790811"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.567051"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133616"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542237"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915072_80"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/527630"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760749.1760787"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/320434.320440"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914655"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_19"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613094"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857711"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41483-6_7"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/320263.320288"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813110"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998450"},{"key":"e_1_3_2_1_31_1","first-page":"118","volume-title":"Discrete mathematics","author":"Gallier J.","unstructured":"J. Gallier. Discrete mathematics. In PWS Publishing, page 118. Springer, 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/320473.320482"},{"key":"e_1_3_2_1_33_1","volume-title":"SIN '13","author":"Hu V. C.","year":"2014","unstructured":"V. C. Hu, D. Ferrariolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, and S. Karen. Guide to attribute based access control (ABAC) definitions and considerations. In NIST Special Publication 800--162, SIN '13, 2014."},{"key":"e_1_3_2_1_34_1","unstructured":"X. Jin. Attribute-Based Access Control Models and Implementation in Cloud Infrastructure as a Service. PhD thesis UTSA 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770575"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315270"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.013"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0272-7"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857706"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752962"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344309"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.COLLABORATECOM2009.8382"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128820"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03095-6_65"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20810-7_4"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370659.1370662"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029828","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029828","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:48:55Z","timestamp":1763459335000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":51,"alternative-id":["10.1145\/3029806.3029828","10.1145\/3029806"],"URL":"https:\/\/doi.org\/10.1145\/3029806.3029828","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}