{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042752,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-0964710"],"award-info":[{"award-number":["CNS-0964710"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078873","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"167-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures"],"prefix":"10.1145","author":[{"given":"Claiborne","family":"Johnson","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Thomas","family":"MacGahan","sequence":"additional","affiliation":[{"name":"Accenture Federal Services, Arlington, VA, USA"}]},{"given":"John","family":"Heaps","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Kevin","family":"Baldor","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Jeffery","family":"von Ronne","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio &amp; Google, Inc., San Antonio, TX, USA"}]},{"given":"Jianwei","family":"Niu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"volume-title":"How to comply with the children's online privacy protection rule.","year":"1999","key":"e_1_3_2_1_1_1","unstructured":"1999. Federal Trade Commission , How to comply with the children's online privacy protection rule. ( 1999 ). DOI: https:\/\/doi.org\/bcp\/conline\/pubs\/buspubs\/coppa.htm Public Law. 1999. Federal Trade Commission, How to comply with the children's online privacy protection rule. (1999). DOI: https:\/\/doi.org\/bcp\/conline\/pubs\/buspubs\/coppa.htm Public Law."},{"volume-title":"Gramm-Leach-Bliley Act.","year":"1999","key":"e_1_3_2_1_2_1","unstructured":"1999. Senate Banking Committee , Gramm-Leach-Bliley Act. ( 1999 ). Public Law 106--102. 1999. Senate Banking Committee, Gramm-Leach-Bliley Act. (1999). Public Law 106--102."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/S095679689700261X"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01782772"},{"key":"e_1_3_2_1_5_1","volume-title":"Enterprise Privacy Authorization Language (EPAL 1.2). (November","author":"Ashley Paul","year":"2003","unstructured":"Paul Ashley , Satoshi Hada , Gijnter Karjoth , Calvin Powers , and Matthias Schunter . 2003. Enterprise Privacy Authorization Language (EPAL 1.2). (November 2003 ). W3C Member Submission . Paul Ashley, Satoshi Hada, Gijnter Karjoth, Calvin Powers, and Matthias Schunter. 2003. Enterprise Privacy Authorization Language (EPAL 1.2). (November 2003). W3C Member Submission."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_7_1","unstructured":"Lujo Bauer Jarred Ligatti and David Walker. 2002. More Enforceable Security Policies. In Foundations of Computer Security.  Lujo Bauer Jarred Ligatti and David Walker. 2002. More Enforceable Security Policies. In Foundations of Computer Security."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70746"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462423"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050046"},{"volume-title":"The Ponder Policy Specification Language","author":"Damianou Nicodemos","key":"e_1_3_2_1_11_1","unstructured":"Nicodemos Damianou , Naranker Dulay , Emil Lupu , and Morris Sloman . 2001. The Ponder Policy Specification Language . In POLICY. Springer-Verlag , London, UK , 18--38. Nicodemos Damianou, Naranker Dulay, Emil Lupu, and Morris Sloman. 2001. The Ponder Policy Specification Language. In POLICY. Springer-Verlag, London, UK, 18--38."},{"volume-title":"Handbook of theoretical computer science, Jan van Leeuwen (Ed.)","author":"Emerson E. Allen","key":"e_1_3_2_1_12_1","unstructured":"E. Allen Emerson . 1990. Temporal and modal logic . In Handbook of theoretical computer science, Jan van Leeuwen (Ed.) . MIT Press , Cambridge, MA, USA , 995--1072. http:\/\/portal.acm.org\/citation.cfm?id=114891.114907 E. Allen Emerson. 1990. Temporal and modal logic. In Handbook of theoretical computer science, Jan van Leeuwen (Ed.). MIT Press, Cambridge, MA, USA, 995--1072. http:\/\/portal.acm.org\/citation.cfm?id=114891.114907"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199468"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2944225.2944368"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(77)90033-9"},{"volume-title":"Health Insurance Portability and Accountability Act (HIPAA). (1996). (42 U.S.C. \u00a7300gg, 29 U.S.C \u00a71181 et seq., and 42 U.S.C \u00a71320d et seq","author":"HIPAA","key":"e_1_3_2_1_16_1","unstructured":"HIPAA 1996. Health Insurance Portability and Accountability Act (HIPAA). (1996). (42 U.S.C. \u00a7300gg, 29 U.S.C \u00a71181 et seq., and 42 U.S.C \u00a71320d et seq .; 45 CFR Parts 144, 146, 160 162, and 164). HIPAA 1996. Health Insurance Portability and Accountability Act (HIPAA). (1996). (42 U.S.C. \u00a7300gg, 29 U.S.C \u00a71181 et seq., and 42 U.S.C \u00a71320d et seq.; 45 CFR Parts 144, 146, 160 162, and 164)."},{"volume-title":"An Actor-Based Framework for Verifiable Privacy Policy Enforcement: Assume-Guarantee Specification of an Actor-Component Architecture. Master's thesis","author":"Johnson Claiborne","key":"e_1_3_2_1_17_1","unstructured":"Claiborne Johnson . 2016. An Actor-Based Framework for Verifiable Privacy Policy Enforcement: Assume-Guarantee Specification of an Actor-Component Architecture. Master's thesis . University of Texas at San Antonio . Claiborne Johnson. 2016. An Actor-Based Framework for Verifiable Privacy Policy Enforcement: Assume-Guarantee Specification of an Actor-Component Architecture. Master's thesis. University of Texas at San Antonio."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(96)00069-2"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"A Logical Framework for History-based Access Control and Reputation Systems","volume":"16","author":"Krukow Karl","year":"2008","unstructured":"Karl Krukow , Mogens Nielsen , and Vladimiro Sassone . 2008 . A Logical Framework for History-based Access Control and Reputation Systems . J. Comput. Secur. 16 , 1 (Jan. 2008), 63--101. http:\/\/dl.acm.org\/citation.cfm?id=1370684.1370686 Karl Krukow, Mogens Nielsen, and Vladimiro Sassone. 2008. A Logical Framework for History-based Access Control and Reputation Systems. J. Comput. Secur. 16, 1 (Jan. 2008), 63--101. http:\/\/dl.acm.org\/citation.cfm?id=1370684.1370686","journal-title":"J. Comput. Secur."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455532"},{"volume-title":"Towards Verifiable Privacy Policy Compliance of an Actor-Based Electronic Medical Records System: An extension to the HAPL language focused on exposing a user interface. Master's thesis","author":"MacGahan Thomas","key":"e_1_3_2_1_23_1","unstructured":"Thomas MacGahan . 2016. Towards Verifiable Privacy Policy Compliance of an Actor-Based Electronic Medical Records System: An extension to the HAPL language focused on exposing a user interface. Master's thesis . University of Texas at San Antonio . Thomas MacGahan. 2016. Towards Verifiable Privacy Policy Compliance of an Actor-Based Electronic Medical Records System: An extension to the HAPL language focused on exposing a user interface. Master's thesis. University of Texas at San Antonio."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084176"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.24"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211865"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414639.2414657"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078873","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078873","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":29,"alternative-id":["10.1145\/3078861.3078873","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078873","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}