{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:52:22Z","timestamp":1764841942838,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Spanish Ministry for Economy and Competitiveness (MINECO)","award":["TIN2016-81032-P"],"award-info":[{"award-number":["TIN2016-81032-P"]}]},{"name":"Secretaria d'Universitats i Recerca de la Generalitat de Catalunya"},{"name":"Spanish Ministry for Economy and Competitiveness (MINECO) and the European Union (FEDER funds)","award":["TIN2013-46181-C2-1-R"],"award-info":[{"award-number":["TIN2013-46181-C2-1-R"]}]},{"name":"Maria de Maeztu Units of Excellence Programme"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078871","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"91-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["A Datalog Framework for Modeling Relationship-based Access Control Policies"],"prefix":"10.1145","author":[{"given":"Edelmira","family":"Pasarella","sequence":"first","affiliation":[{"name":"Universitat Polit\u00e8cnica de Catalunya, Barcelona, Spain"}]},{"given":"Jorge","family":"Lobo","sequence":"additional","affiliation":[{"name":"Instituci\u00f3 Catalana de Recerca i Estudis Avan\u00e7ats (ICREA)-Universitat Pompeu Fabra, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/98480.98484"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(02)00126-X"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1835408.1835411"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133616"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406705"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613094"},{"key":"e_1_3_2_1_9_1","volume-title":"Paths and Principal Matching: A New Approach to Access Control. arXiv preprint arXiv:1505.07945","author":"Crampton Jason","year":"2015","unstructured":"Jason Crampton and James Sellwood . 2015. Relationships , Paths and Principal Matching: A New Approach to Access Control. arXiv preprint arXiv:1505.07945 ( 2015 ). Jason Crampton and James Sellwood. 2015. Relationships, Paths and Principal Matching: A New Approach to Access Control. arXiv preprint arXiv:1505.07945 (2015)."},{"volume-title":"Security and usability: designing secure systems that people can use. \"O'Reilly Media","author":"Cranor Lorrie Faith","key":"e_1_3_2_1_10_1","unstructured":"Lorrie Faith Cranor and Simson Garfinkel . 2005. Security and usability: designing secure systems that people can use. \"O'Reilly Media , Inc .\" Lorrie Faith Cranor and Simson Garfinkel. 2005. Security and usability: designing secure systems that people can use. \"O'Reilly Media, Inc.\""},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/502807.502810"},{"key":"e_1_3_2_1_12_1","volume-title":"Report","author":"Fodor Paul","year":"2011","unstructured":"Paul Fodor , Senlin Liang , and Michael Kifer . 2011. OpenRuleBench : Report 2011 . (2011). Paul Fodor, Senlin Liang, and Michael Kifer. 2011. OpenRuleBench: Report 2011. (2011)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516720"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998450"},{"key":"e_1_3_2_1_15_1","volume-title":"Access control requirements for web 2.0 security and privacy","author":"Gates Carrie","year":"2007","unstructured":"Carrie Gates . 2007. Access control requirements for web 2.0 security and privacy . IEEE Web 2, 0 ( 2007 ). Carrie Gates. 2007. Access control requirements for web 2.0 security and privacy. IEEE Web 2, 0 (2007)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_26"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(91)90059-B"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526790"},{"volume-title":"Logic programming, knowledge representation, and nonmonotonic reasoning","author":"Lobo Jorge","key":"e_1_3_2_1_22_1","unstructured":"Jorge Lobo , Jiefei Ma , Alessandra Russo , Emil Lupu , Seraphin Calo , and Morris Sloman . 2011. Refinement of history-based policies . In Logic programming, knowledge representation, and nonmonotonic reasoning . Springer , 280--299. Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil Lupu, Seraphin Calo, and Morris Sloman. 2011. Refinement of history-based policies. In Logic programming, knowledge representation, and nonmonotonic reasoning. Springer, 280--299."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/263661.263664"},{"volume-title":"On conceptual modelling","author":"Reiter Raymond","key":"e_1_3_2_1_24_1","unstructured":"Raymond Reiter . 1984. Towards a logical reconstruction of relational database theory . In On conceptual modelling . Springer , 191--238. Raymond Reiter. 1984. Towards a logical reconstruction of relational database theory. In On conceptual modelling. Springer, 191--238."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752962"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01762108"},{"key":"e_1_3_2_1_27_1","volume-title":"Column-Oriented Datalog Materialization for Large Knowledge Graphs. In Thirtieth AAAI Conference on Artificial Intelligence. 258--264","author":"Urbani Jacopo","year":"2016","unstructured":"Jacopo Urbani , Ceriel Jacobs , and Markus Kr\u00f6tzsch . 2016 . Column-Oriented Datalog Materialization for Large Knowledge Graphs. In Thirtieth AAAI Conference on Artificial Intelligence. 258--264 . Jacopo Urbani, Ceriel Jacobs, and Markus Kr\u00f6tzsch. 2016. Column-Oriented Datalog Materialization for Large Knowledge Graphs. In Thirtieth AAAI Conference on Artificial Intelligence. 258--264."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/212433.212474"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078871","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":28,"alternative-id":["10.1145\/3078861.3078871","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078871","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}