{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:15Z","timestamp":1750221375786,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176323","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"186-195","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of Relationship-Based Access Control Policies"],"prefix":"10.1145","author":[{"given":"Amirreza","family":"Masoumzadeh","sequence":"first","affiliation":[{"name":"University at Albany - SUNY, Albany, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029828"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133616"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542237"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915072_80"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752967"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857711"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613094"},{"key":"e_1_3_2_1_10_1","volume-title":"May 29","author":"Crampton J.","year":"2015","unstructured":"J. Crampton and J. Sellwood . Relationships, Paths and Principal Matching: A New Approach to Access Control. arXiv:1505.07945 {cs} , May 29 , 2015 . arXiv: 1505.07945;. J. Crampton and J. Sellwood. Relationships, Paths and Principal Matching: A New Approach to Access Control. arXiv:1505.07945 {cs}, May 29, 2015. arXiv: 1505.07945;."},{"key":"e_1_3_2_1_11_1","unstructured":"eXtensible Access Control Markup Language (XACML) Version 3.0 OASIS 2013.  eXtensible Access Control Markup Language (XACML) Version 3.0 OASIS 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998450"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.18"},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-642-22348-8_5","volume-title":"Multiparty Authorization Frame- work for Data Sharing in Online Social Networks","author":"Hu H.","year":"2011","unstructured":"H. Hu and G.-j. Ahn . Multiparty Authorization Frame- work for Data Sharing in Online Social Networks . In Y. Li, editor, Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, volume 6818 of Lecture Notes in Computer Science , pages 29 -- 43 . Springer Berlin \/ Heidelberg , 2011 . H. Hu and G.-j. Ahn. Multiparty Authorization Frame- work for Data Sharing in Online Social Networks. In Y. Li, editor, Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, volume 6818 of Lecture Notes in Computer Science, pages 29--43. Springer Berlin \/ Heidelberg, 2011."},{"key":"e_1_3_2_1_17_1","volume-title":"Workshop on Friend of a Friend, Social Networking and the Semantic Web","author":"Kruk S. R.","year":"2004","unstructured":"S. R. Kruk . FOAF-Realm : control your friends access to the resource . In Workshop on Friend of a Friend, Social Networking and the Semantic Web , 2004 . S. R. Kruk. FOAF-Realm: control your friends access to the resource. In Workshop on Friend of a Friend, Social Networking and the Semantic Web, 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990058"},{"key":"e_1_3_2_1_19_1","first-page":"123","volume-title":"Proceedings of the 2003 Symposium on Security and Privacy","author":"Li N.","year":"2003","unstructured":"N. Li and W. H. Winsborough . Beyond proof-of-compliance: safety and availability analysis in trust management . In Proceedings of the 2003 Symposium on Security and Privacy , pages 123 -- 139 , May 2003 . N. Li and W. H. Winsborough. Beyond proof-of-compliance: safety and availability analysis in trust management. In Proceedings of the 2003 Symposium on Security and Privacy, pages 123--139, May 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/773065.773067"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0106-1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.116"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 24th USENIX Large Installation System Administration Conference (LISA 2010)","author":"Nelson T.","year":"2010","unstructured":"T. Nelson , D. J. Dougherty , C. Barratt , and K. Fisler . The Margrave Tool for Firewall Analysis . In Proceedings of the 24th USENIX Large Installation System Administration Conference (LISA 2010) , 2010 . T. Nelson, D. J. Dougherty, C. Barratt, and K. Fisler. The Margrave Tool for Firewall Analysis. In Proceedings of the 24th USENIX Large Installation System Administration Conference (LISA 2010), 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078871"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752962"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884182"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42286"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.22"},{"key":"e_1_3_2_1_30_1","first-page":"53","volume-title":"An Administrative Model for Relationship- Based Access Control. In SpringerLink. IFIP Annual Conference on Data and Applications Security and Privacy","author":"Stoller S. D.","year":"2015","unstructured":"S. D. Stoller . An Administrative Model for Relationship- Based Access Control. In SpringerLink. IFIP Annual Conference on Data and Applications Security and Privacy , pages 53 -- 68 . Springer, Cham , July 13, 2015 . S. D. Stoller. An Administrative Model for Relationship- Based Access Control. In SpringerLink. IFIP Annual Conference on Data and Applications Security and Privacy, pages 53--68. Springer, Cham, July 13, 2015."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176323","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":30,"alternative-id":["10.1145\/3176258.3176323","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176323","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}