{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:21Z","timestamp":1750306101366,"version":"3.41.0"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T00:00:00Z","timestamp":1517788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Scrutable Autonomous Systems","award":["EP\/J012084\/1"],"award-info":[{"award-number":["EP\/J012084\/1"]}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2018,8,31]]},"abstract":"<jats:p>We address the problem of associating access policies with datasets and how to monitor compliance via policy-carrying data. Our contributions are a formal model in first-order logic inspired by normative multi-agent systems to regulate data access, and a computational model for the validation of specific use cases and the verification of policies against criteria. Existing work on access policy identifies roles as a key enabler, with which we concur, but much of the rest focusses on authentication and authorization technology. Our proposal aims to address the normative principles put forward in Berners-Lee\u2019s bill of rights for the internet, through human-readable but machine-processable access control policies.<\/jats:p>","DOI":"10.1145\/3133324","type":"journal-article","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T18:13:28Z","timestamp":1517940808000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Fine-Grained Access Control via Policy-Carrying Data"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1314-2094","authenticated-orcid":false,"given":"Julian A.","family":"Padget","sequence":"first","affiliation":[{"name":"University of Bath, United Kingdom, Bath, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wamberto W.","family":"Vasconcelos","sequence":"additional","affiliation":[{"name":"University of Aberdeen, United Kingdom, Aberdeen, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,2,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882967"},{"key":"e_1_2_1_2_1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson Ross J.","year":"2001","unstructured":"Ross J. Anderson . 2001 . Security Engineering: A Guide to Building Dependable Distributed Systems ( 1 st ed.). John Wiley 8 Sons, New York, NY. Ross J. Anderson. 2001. Security Engineering: A Guide to Building Dependable Distributed Systems (1st ed.). John Wiley 8 Sons, New York, NY.","edition":"1"},{"key":"e_1_2_1_3_1","volume-title":"Normative Multi-Agent Systems. Dagstuhl Follow-Ups","volume":"4","author":"Andrighetto Giulia","unstructured":"Giulia Andrighetto , Guido Governatori , Pablo Noriega , and Leendert W. N . van der Torre (Eds.). 2013 . Normative Multi-Agent Systems. Dagstuhl Follow-Ups , Vol. 4 . Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany. i--xi. Giulia Andrighetto, Guido Governatori, Pablo Noriega, and Leendert W. N. van der Torre (Eds.). 2013. Normative Multi-Agent Systems. Dagstuhl Follow-Ups, Vol. 4. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany. i--xi."},{"volume-title":"From Logic Programming to Prolog","author":"Apt Krzysztof R.","key":"e_1_2_1_4_1","unstructured":"Krzysztof R. Apt . 1997. From Logic Programming to Prolog . Prentice Hall , London . Krzysztof R. Apt. 1997. From Logic Programming to Prolog. Prentice Hall, London."},{"key":"e_1_2_1_5_1","volume-title":"Marina De Vos, and Julian A. Padget","author":"Balke Tina","year":"2013","unstructured":"Tina Balke , Marina De Vos, and Julian A. Padget . 2013 . Evaluating the cost of enforcement by agent-based simulation: A wireless mobile grid example, See Boella et al. (2013). Tina Balke, Marina De Vos, and Julian A. Padget. 2013. Evaluating the cost of enforcement by agent-based simulation: A wireless mobile grid example, See Boella et al. (2013)."},{"volume-title":"Runtime Verification. LNCS","author":"Basin David","key":"e_1_2_1_6_1","unstructured":"David Basin , Felix Klaedtke , Srdjan Marinovic , and Eugen Z\u0103linescu . 2013. Monitoring compliance policies over incomplete and disagreeing logs . In Runtime Verification. LNCS , Vol. 7687 . Springer . David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Z\u0103linescu. 2013. Monitoring compliance policies over incomplete and disagreeing logs. In Runtime Verification. LNCS, Vol. 7687. Springer."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_1"},{"key":"e_1_2_1_8_1","unstructured":"Tim Berners-Lee. 1999. Weaving the Web: The Past Present and Future of the World Wide Web by its Inventor. Orion Business.   Tim Berners-Lee. 1999. Weaving the Web: The Past Present and Future of the World Wide Web by its Inventor. Orion Business."},{"volume-title":"Role Theory","author":"Biddle Bruce J.","key":"e_1_2_1_9_1","unstructured":"Bruce J. Biddle . 1979. Role Theory . Academic Press , San Diego . Bruce J. Biddle. 1979. Role Theory. Academic Press, San Diego."},{"key":"e_1_2_1_10_1","volume-title":"Frank Dignum, and Martin K. Purvis (Eds.).","author":"Boella Guido","year":"2013","unstructured":"Guido Boella , Edith Elkind , Bastin Tony Roy Savarimuthu , Frank Dignum, and Martin K. Purvis (Eds.). 2013 . Proceedings of the Principles 8 Practice of Multi-Agent Systems (PRIMA\u201913). LNCS, Vol. 8291 . Springer . Guido Boella, Edith Elkind, Bastin Tony Roy Savarimuthu, Frank Dignum, and Martin K. Purvis (Eds.). 2013. Proceedings of the Principles 8 Practice of Multi-Agent Systems (PRIMA\u201913). LNCS, Vol. 8291. Springer."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047788.1047818"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_2_1_13_1","volume-title":"Duda","author":"Buchanan Bruce G.","year":"1983","unstructured":"Bruce G. Buchanan and Richard O . Duda . 1983 . Principles of rule-based expert systems. In Advances in Computers, Vol. 22 , Marshall C. Yovits (Ed.). Elsevier , 163--216. Bruce G. Buchanan and Richard O. Duda. 1983. Principles of rule-based expert systems. In Advances in Computers, Vol. 22, Marshall C. Yovits (Ed.). Elsevier, 163--216."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of theInternationalWorkshop on Coordination, Organizations, Institutions and Norms (COIN@ECAI\u201916)","author":"Cauvin Samuel R.","year":"2016","unstructured":"Samuel R. Cauvin , Martin J. Kollingbaum , Derek Sleeman , and Wamberto W. Vasconcelos . 2016. Towards a Distributed Data-Sharing Economy . In Proceedings of theInternationalWorkshop on Coordination, Organizations, Institutions and Norms (COIN@ECAI\u201916) . ( 2016 ). Samuel R. Cauvin, Martin J. Kollingbaum, Derek Sleeman, and Wamberto W. Vasconcelos. 2016. Towards a Distributed Data-Sharing Economy. In Proceedings of theInternationalWorkshop on Coordination, Organizations, Institutions and Norms (COIN@ECAI\u201916). (2016)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_2"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11775331_7"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2773565.2773658"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.04.005"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11678823_1"},{"key":"e_1_2_1_22_1","volume-title":"First-Order Logic and Automated Theorem Proving","author":"Fitting Melvin","unstructured":"Melvin Fitting . 1996. First-Order Logic and Automated Theorem Proving ( 2 nd ed.). Springer-Verlag , New York, NY . Melvin Fitting. 1996. First-Order Logic and Automated Theorem Proving (2nd ed.). Springer-Verlag, New York, NY.","edition":"2"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-008-9059-4"},{"key":"e_1_2_1_24_1","first-page":"3","article-title":"Action languages","volume":"2","author":"Gelfond Michael","year":"1998","unstructured":"Michael Gelfond and Vladimir Lifschitz . 1998 . Action languages . Electron. Trans. Artif. Intell. 2 , 3 -- 4 (1998), 193--210. http:\/\/www.ep.liu.se\/ej\/etai\/1998\/007\/. Michael Gelfond and Vladimir Lifschitz. 1998. Action languages. Electron. Trans. Artif. Intell. 2, 3--4 (1998), 193--210. http:\/\/www.ep.liu.se\/ej\/etai\/1998\/007\/.","journal-title":"Electron. Trans. Artif. Intell."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10992-013-9295-1"},{"key":"e_1_2_1_26_1","first-page":"14","article-title":"Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In Privacy and Identity Management for Life. IFIP Adv. in Inf. 8","volume":"375","author":"Hansen Marit","year":"2012","unstructured":"Marit Hansen . 2012 . Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In Privacy and Identity Management for Life. IFIP Adv. in Inf. 8 Comm. Techn. , Vol. 375. Spring er, 14 -- 31 . Marit Hansen. 2012. Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In Privacy and Identity Management for Life. IFIP Adv. in Inf. 8 Comm. Techn., Vol. 375. Springer, 14--31.","journal-title":"Comm. Techn."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04238-6_39"},{"key":"e_1_2_1_28_1","volume-title":"Retrieved","author":"Bill Investigatory Powers","year":"2016","unstructured":"Investigatory Powers Bill 2016 . UK Legislation . Retrieved February 27, 2017 from http:\/\/www.legislation.gov.uk\/id?title=Investigatory+Powers+Act+2016. Investigatory Powers Bill 2016. UK Legislation. Retrieved February 27, 2017 from http:\/\/www.legislation.gov.uk\/id?title=Investigatory+Powers+Act+2016."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"volume-title":"The Construction of Social Reality. Allen Lane","author":"Searle John R.","key":"e_1_2_1_30_1","unstructured":"John R. Searle . 1995. The Construction of Social Reality. Allen Lane , Penguin Press . John R. Searle. 1995. The Construction of Social Reality. Allen Lane, Penguin Press."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/4.3.427"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765299.1765305"},{"volume-title":"Proceedings of the International Conference on Autonomous Agents 8 Multiagent Systems (AAMAS\u201915)","author":"King Thomas Christopher","key":"e_1_2_1_33_1","unstructured":"Thomas Christopher King , Tingting Li , Marina De Vos , Virginia Dignum , Catholijn M. Jonker , Julian Padget , and M. Birna van Riemsdijk. 2015. A framework for institutions governing institutions . In Proceedings of the International Conference on Autonomous Agents 8 Multiagent Systems (AAMAS\u201915) . 473--481. http:\/\/dl.acm.org\/citation.cfm?id&equals;2772940. Thomas Christopher King, Tingting Li, Marina De Vos, Virginia Dignum, Catholijn M. Jonker, Julian Padget, and M. Birna van Riemsdijk. 2015. A framework for institutions governing institutions. In Proceedings of the International Conference on Autonomous Agents 8 Multiagent Systems (AAMAS\u201915). 473--481. http:\/\/dl.acm.org\/citation.cfm?id&equals;2772940."},{"key":"e_1_2_1_34_1","volume-title":"Retreived","author":"Kiss Jemima","year":"2014","unstructured":"Jemima Kiss . 2014 . An online Magna Carta: Berners-Lee calls for bill of rights for web. Web content . Retreived December 18, 2017 from http:\/\/www.theguardian.com\/technology\/2014\/mar\/12\/online-magna-carta-berners-lee-web. Jemima Kiss. 2014. An online Magna Carta: Berners-Lee calls for bill of rights for web. Web content. Retreived December 18, 2017 from http:\/\/www.theguardian.com\/technology\/2014\/mar\/12\/online-magna-carta-berners-lee-web."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037383"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514601.2514627"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Bernard Litaer. 2002. The Future of Money: Creating New Wealth Work and a Wiser World. Century.  Bernard Litaer. 2002. The Future of Money: Creating New Wealth Work and a Wiser World. Century.","DOI":"10.1108\/ebr.2001.05413bab.008"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/357162.357169"},{"volume-title":"Logic and the Modalities in the Twentieth Century.","author":"McNamara Paul","key":"e_1_2_1_39_1","unstructured":"Paul McNamara . 2006. Deontic logic . In Logic and the Modalities in the Twentieth Century. Vol. 7 . North-Holland . Paul McNamara. 2006. Deontic logic. In Logic and the Modalities in the Twentieth Century. Vol. 7. North-Holland."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.04.011"},{"volume-title":"Deontic Logic in Computer Science: Normative System Specification","author":"Meyer John-Jules C.","key":"e_1_2_1_42_1","unstructured":"John-Jules C. Meyer and Roel. J. Wieringa . 1993. Applications of deontic logic in computer science: A concise overview . In Deontic Logic in Computer Science: Normative System Specification . John Wiley 8 Sons. John-Jules C. Meyer and Roel. J. Wieringa. 1993. Applications of deontic logic in computer science: A concise overview. In Deontic Logic in Computer Science: Normative System Specification. John Wiley 8 Sons."},{"volume-title":"Institutional Change and Economic Performance","author":"North Douglass C.","key":"e_1_2_1_43_1","unstructured":"Douglass C. North . 1990. Institutions , Institutional Change and Economic Performance . Cambridge University Press . Douglass C. North. 1990. Institutions, Institutional Change and Economic Performance. Cambridge University Press."},{"volume-title":"Understanding Institutional Diversity","author":"Ostrom Elinor","key":"e_1_2_1_44_1","unstructured":"Elinor Ostrom . 2005. Understanding Institutional Diversity . Princeton University Press . Elinor Ostrom. 2005. Understanding Institutional Diversity. Princeton University Press."},{"key":"e_1_2_1_45_1","volume-title":"The Platform for Privacy Preferences 1.1 (P3P1.1) Specification","author":"P","year":"2017","unstructured":"P3 P 2006. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification . World Wide Web Consortium (W 3C). Retrieved February 27, 2017 from https:\/\/www.w3.org\/TR\/P3P11\/. P3P 2006. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. World Wide Web Consortium (W3C). Retrieved February 27, 2017 from https:\/\/www.w3.org\/TR\/P3P11\/."},{"key":"e_1_2_1_46_1","volume-title":"Tingting Li, and Marina De Vos.","author":"Padget Julian","year":"2016","unstructured":"Julian Padget , Emad ElDeen Elakehal , Tingting Li, and Marina De Vos. 2016 . InstAL: An Institutional Action Language. Springer International , 101--124. Julian Padget, Emad ElDeen Elakehal, Tingting Li, and Marina De Vos. 2016. InstAL: An Institutional Action Language. Springer International, 101--124."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.020"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.07.003"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01530822"},{"volume-title":"Logic and Databases","author":"Reiter Raymond","key":"e_1_2_1_50_1","unstructured":"Raymond Reiter . 1978. On closed world databases . In Logic and Databases . Plenum Press , NY. Raymond Reiter. 1978. On closed world databases. In Logic and Databases. Plenum Press, NY."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11576-008-0078-1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699357"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-44927-7_21"},{"volume-title":"Security Technol. Comm. in Comp. 8 Inf. Science","author":"Suhendra Vivy","key":"e_1_2_1_55_1","unstructured":"Vivy Suhendra . 2011. A survey on access control deployment . In Security Technol. Comm. in Comp. 8 Inf. Science , Vol. 259 . Springer . Vivy Suhendra. 2011. A survey on access control deployment. In Security Technol. Comm. in Comp. 8 Inf. Science, Vol. 259. Springer."},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the 6th Workshop on Computational Models of Narrative (CMN\u201915)","volume":"45","author":"Thompson Matthew","year":"2015","unstructured":"Matthew Thompson , Julian Padget , and Steve Battle . 2015 . Governing narrative events with institutional norms . In Proceedings of the 6th Workshop on Computational Models of Narrative (CMN\u201915) , Mark A. Finlayson, Ben Miller, Antonio Lieto, and R\u00e9mi Ronfard (Eds.). OASICS , Vol. 45 . Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 142--151. Matthew Thompson, Julian Padget, and Steve Battle. 2015. Governing narrative events with institutional norms. In Proceedings of the 6th Workshop on Computational Models of Narrative (CMN\u201915), Mark A. Finlayson, Ben Miller, Antonio Lieto, and R\u00e9mi Ronfard (Eds.). OASICS, Vol. 45. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 142--151."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_27"},{"volume-title":"Role Theory","author":"Turner Ralph H.","key":"e_1_2_1_58_1","unstructured":"Ralph H. Turner . 2001. Role Theory . Springer , Boston, MA , 233--254. Ralph H. Turner. 2001. Role Theory. Springer, Boston, MA, 233--254."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.108"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-008-9070-9"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/LX.237.1"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.128"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133324","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:34Z","timestamp":1750217434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,5]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,8,31]]}},"alternative-id":["10.1145\/3133324"],"URL":"https:\/\/doi.org\/10.1145\/3133324","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2018,2,5]]},"assertion":[{"value":"2016-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}