{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1253930"],"award-info":[{"award-number":["1253930"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078862","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"9-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Flexible Authorization Architecture for Systems of Interoperable Medical Devices"],"prefix":"10.1145","author":[{"given":"Qais","family":"Tasali","sequence":"first","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"Chandan","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"Eugene Y.","family":"Vasserman","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Medical device \"plug-and-play\" interoperability program. http:\/\/mdpnp.org. (Accessed on 2\/20\/2017).  Medical device \"plug-and-play\" interoperability program. http:\/\/mdpnp.org. (Accessed on 2\/20\/2017)."},{"key":"e_1_3_2_1_2_1","unstructured":"Axiomatics language for authorization (ALFA). https:\/\/www.axiomatics.com\/solutions\/products\/authorization-for-applications\/developer-tools-and-apis\/192-axiomatics-language-for-authorization-alfa.html 2015. (Accessed on 2\/21\/2017).  Axiomatics language for authorization (ALFA). https:\/\/www.axiomatics.com\/solutions\/products\/authorization-for-applications\/developer-tools-and-apis\/192-axiomatics-language-for-authorization-alfa.html 2015. (Accessed on 2\/21\/2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"OACC | Java application security framework. http:\/\/oaccframework.org\/ 2016. (Accessed on 2\/21\/2017).  OACC | Java application security framework. http:\/\/oaccframework.org\/ 2016. (Accessed on 2\/21\/2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Shiro | Simple. Java. Security. https:\/\/shiro.apache.org\/caching.html. (Accessed on 4\/25\/2017).  Apache Shiro | Simple. Java. Security. https:\/\/shiro.apache.org\/caching.html. (Accessed on 4\/25\/2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"Apache Shiro | Simple. Java. Security. https:\/\/shiro.apache.org\/documentation.html. (Accessed on 1\/12\/2017).  Apache Shiro | Simple. Java. Security. https:\/\/shiro.apache.org\/documentation.html. (Accessed on 1\/12\/2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"S. Barrett. The MDCF PCA Shutoff App 0.3 Documentation. http:\/\/people.cs.ksu.edu\/~scbarrett\/pcashutoff-doc\/ 2015.  S. Barrett. The MDCF PCA Shutoff App 0.3 Documentation. http:\/\/people.cs.ksu.edu\/~scbarrett\/pcashutoff-doc\/ 2015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542239"},{"volume-title":"W3C Workshop on Access Control Application Scenarios","year":"2009","author":"Carreras A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872160"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2012.6158775"},{"volume-title":"IEEE Proceedings - Software, 153(1)","year":"2006","author":"Eyers J.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.12"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2006.95"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2012.9"},{"volume-title":"Workshop on Pervasive Privacy Security, Privacy, and Trust","year":"2004","author":"Hu J.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"V. C. Hu D. Ferraiolo R. Kuhn A. R. Friedman A. J. Lang M. M. Cogdell A. Schnitzer K. Sandlin R. Miller and K. Scarfone. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Special Publication 800--162 2013.  V. C. Hu D. Ferraiolo R. Kuhn A. R. Friedman A. J. Lang M. M. Cogdell A. Schnitzer K. Sandlin R. Miller and K. Scarfone. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Special Publication 800--162 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"V. C. Hu D. R. Kuhn and D. F. Ferraiolo. Attribute-based access control. IEEE Computer 48(2) 2015.  V. C. Hu D. R. Kuhn and D. F. Ferraiolo. Attribute-based access control. IEEE Computer 48(2) 2015.","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110363.2110448"},{"key":"e_1_3_2_1_21_1","first-page":"F2761","author":"Medical","year":"2008","journal-title":"ASTM"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542228"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.09.001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_8"},{"volume-title":"ICITST","year":"2011","author":"Jung M.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2015.30"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809085.1809086"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2014.49"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-COMPANION.2009.5070972"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968563"},{"key":"e_1_3_2_1_32_1","unstructured":"OASIS. eXtensible access control markup language (XACML) version 3.0. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html 2013.  OASIS. eXtensible access control markup language (XACML) version 3.0. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html 2013."},{"key":"e_1_3_2_1_33_1","unstructured":"OpenICE User Introduction. https:\/\/www.openice.info\/docs\/1_overview.html.  OpenICE User Introduction. https:\/\/www.openice.info\/docs\/1_overview.html."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/839280.840571"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2008.03.014"},{"key":"e_1_3_2_1_36_1","unstructured":"Pivotal Software Inc. Spring security. https:\/\/projects.spring.io\/spring-security\/ 2017. (Accessed on 2\/21\/2017).  Pivotal Software Inc. Spring security. https:\/\/projects.spring.io\/spring-security\/ 2017. (Accessed on 2\/21\/2017)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2016.7455820"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752962"},{"volume-title":"Norwegian University of Science and Technology","year":"2008","author":"R\u00f8stad L.","key":"e_1_3_2_1_39_1"},{"volume-title":"Kansas State University","year":"2014","author":"Salazar C.","key":"e_1_3_2_1_40_1"},{"volume-title":"FHIES\/SEHC","year":"2014","author":"Salazar C.","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_43_1","unstructured":"M. Siriwardena. Balana. https:\/\/github.com\/wso2\/balana. (Accessed on 1\/12\/2017).  M. Siriwardena. Balana. https:\/\/github.com\/wso2\/balana. (Accessed on 1\/12\/2017)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"S. Sucurovic. An approach to access control in electronic health record. Journal of medical systems 34(4) 2010.  S. Sucurovic. An approach to access control in electronic health record. Journal of medical systems 34(4) 2010.","DOI":"10.1007\/s10916-009-9279-4"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232473"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05149-9_13"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914653"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507731"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078862","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078862","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":48,"alternative-id":["10.1145\/3078861.3078862","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078862","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}