{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T21:57:53Z","timestamp":1764194273143,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Sciences and Engineering Research Council of Canada","award":["RGPIN-2014-06611"],"award-info":[{"award-number":["RGPIN-2014-06611"]}]},{"name":"Canada Research Chair","award":["950-229712"],"award-info":[{"award-number":["950-229712"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176331","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"204-211","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model"],"prefix":"10.1145","author":[{"given":"Syed Zain R.","family":"Rizvi","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Philip W. L.","family":"Fong","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Intro to Cypher. https:\/\/neo4j.com\/developer\/cypher-query-language\/.  Intro to Cypher. https:\/\/neo4j.com\/developer\/cypher-query-language\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Neo4J. http:\/\/neo4j.com\/.  Neo4J. http:\/\/neo4j.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"OpenMRS. http:\/\/openmrs.org\/.  OpenMRS. http:\/\/openmrs.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data.  Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029828"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322432.1322433"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133616"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_19"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613094"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857711"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855103"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516720"},{"key":"e_1_3_2_1_16_1","volume-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (Jan","author":"Hu V. C.","year":"2014","unstructured":"Hu , V. C. , Ferraiolo , D. , Kuhn , R. , Schnitzer , A. , Sandlin , K. , Miller , R. , and Scarfone , K . Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (Jan . 2014 ). Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., and Scarfone, K. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (Jan. 2014)."},{"key":"e_1_3_2_1_17_1","volume-title":"UCI machine learning repository","author":"Lichman M.","year":"2013","unstructured":"Lichman , M. UCI machine learning repository , 2013 . Lichman, M. UCI machine learning repository, 2013."},{"key":"e_1_3_2_1_18_1","volume":"10","author":"Nielsen","unstructured":"Nielsen , J. Powers of 10 : Time scales in user experience. https:\/\/www.nngroup.com\/articles\/powers-of-10-time-scales-in-ux\/. Nielsen, J. Powers of 10: Time scales in user experience. https:\/\/www.nngroup.com\/articles\/powers-of-10-time-scales-in-ux\/.","journal-title":"J. Powers of"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078871"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.1993.tb00310.x"},{"key":"e_1_3_2_1_21_1","unstructured":"Rizvi S. Z. R. Attribute-supporting ReBAC model. http:\/\/pages.cpsc.ucalgary.ca\/ szrrizvi\/projectAReBAC\/ 2018.  Rizvi S. Z. R. Attribute-supporting ReBAC model. http:\/\/pages.cpsc.ucalgary.ca\/ szrrizvi\/projectAReBAC\/ 2018."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857706"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752962"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613098"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900008.1900067"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":25,"alternative-id":["10.1145\/3176258.3176331","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176331","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}