{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:20Z","timestamp":1750308980545,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T00:00:00Z","timestamp":1528329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,7]]},"DOI":"10.1145\/3205977.3208950","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:49:37Z","timestamp":1528400977000},"page":"217-219","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control"],"prefix":"10.1145","author":[{"given":"Jiaming","family":"Jiang","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Rada","family":"Chirkova","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Jon","family":"Doyle","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Arnon","family":"Rosenthal","sequence":"additional","affiliation":[{"name":"The MITRE Corporation, Bedford, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,7]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952991"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28641-4_21"},{"volume-title":"OWL Web Ontology Language Reference","author":"Dean Mike","key":"e_1_3_2_1_4_1","unstructured":"Mike Dean , Guus Schreiber , Sean Bechhofer , Frank van Harmelen , Jim Hendler , Ian Horrocks , Deborah L. McGuinness , Peter F. Patel-Schneider , and Lynn Andrea Stein . 2004. OWL Web Ontology Language Reference . World Wide Web Consortium (W 3C), Cambridge, MA, USA. http:\/\/www.w3.org\/TR\/owl-ref\/ Mike Dean, Guus Schreiber, Sean Bechhofer, Frank van Harmelen, Jim Hendler, Ian Horrocks, Deborah L. McGuinness, Peter F. Patel-Schneider, and Lynn Andrea Stein. 2004. OWL Web Ontology Language Reference. World Wide Web Consortium (W3C), Cambridge, MA, USA. http:\/\/www.w3.org\/TR\/owl-ref\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377849"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2008.76"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"volume-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations. Special Publication (NIST SP) 800--162. National Institutes of Standards and Technology (NIST)","author":"Hu Chung Tong","key":"e_1_3_2_1_8_1","unstructured":"Chung Tong Hu , David F. Ferraiolo , David R. Kuhn , Adam Schnitzer , Kenneth Sandlin , Robert Miller , and Karen Scarfone . 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. Special Publication (NIST SP) 800--162. National Institutes of Standards and Technology (NIST) , Gaithersburg, Maryland . Chung Tong Hu, David F. Ferraiolo, David R. Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, and Karen Scarfone. 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. Special Publication (NIST SP) 800--162. National Institutes of Standards and Technology (NIST), Gaithersburg, Maryland."},{"volume-title":"Ngyuen Quoc Trung","author":"Jin Peng","key":"e_1_3_2_1_9_1","unstructured":"Peng Jin and Yang Fang-chun. 2006. Description Logic Modeling of Temporal Attribute-Based Access Control 2006 First International Conference on Communications and Electronics , Ngyuen Quoc Trung , Kazuo Tanaka, and Hyukjae Lee (Eds.). IEEE , Los Alamitos, CA , 414--418. Peng Jin and Yang Fang-chun. 2006. Description Logic Modeling of Temporal Attribute-Based Access Control 2006 First International Conference on Communications and Electronics, Ngyuen Quoc Trung, Kazuo Tanaka, and Hyukjae Lee (Eds.). IEEE, Los Alamitos, CA, 414--418."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4199"},{"key":"e_1_3_2_1_13_1","volume-title":"FACS 2011","author":"Puspa Kencana Ramli Carroline Dewi","year":"2011","unstructured":"Carroline Dewi Puspa Kencana Ramli , Hanne Riis Nielson , and Flemming Nielson . 2011 . The Logic of XACML Formal Aspects of Component Software - 8th International Symposium , FACS 2011 , Oslo, Norway, September 14--16 , 2011, Revised Selected Papers. Springer, Springer, Berlin Heidelberg, 205--222. Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, and Flemming Nielson. 2011. The Logic of XACML Formal Aspects of Component Software - 8th International Symposium, FACS 2011, Oslo, Norway, September 14--16, 2011, Revised Selected Papers. Springer, Springer, Berlin Heidelberg, 205--222."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542218"},{"key":"e_1_3_2_1_15_1","volume-title":"Osborn","author":"Servos Daniel","year":"2014","unstructured":"Daniel Servos and Sylvia L . Osborn . 2014 . HGABAC : Towards a Formal Model of Hierarchical Attribute-Based Access Control Seventh International Symposium on Foundations and Practice of Security (Lecture Notes in Computer Science), Fr\u00e9d\u00e9ric Cuppens, Joaqu\u0131n Garc\u0131a-Alfaro, A. Nur Zincir-Heywood, and Philip W. L. Fong (Eds.). Springer , Cham, Switzerland, 187--204. Daniel Servos and Sylvia L. Osborn. 2014. HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control Seventh International Symposium on Foundations and Practice of Security (Lecture Notes in Computer Science), Fr\u00e9d\u00e9ric Cuppens, Joaqu\u0131n Garc\u0131a-Alfaro, A. Nur Zincir-Heywood, and Philip W. L. Fong (Eds.). Springer, Cham, Switzerland, 187--204."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"key":"e_1_3_2_1_17_1","volume-title":"Representing Attribute Based Access Control Policies in OWL Tenth IEEE International Conference on Semantic Computing, ICSC 2016","author":"Sharma Nitin Kumar","year":"2016","unstructured":"Nitin Kumar Sharma and Anupam Joshi . 2016 . Representing Attribute Based Access Control Policies in OWL Tenth IEEE International Conference on Semantic Computing, ICSC 2016 , Laguna Hills, CA, USA, February 4--6 , 2016. IEEE Computer Society, Los Alamitos, CA, 333--336. Nitin Kumar Sharma and Anupam Joshi. 2016. Representing Attribute Based Access Control Policies in OWL Tenth IEEE International Conference on Semantic Computing, ICSC 2016, Laguna Hills, CA, USA, February 4--6, 2016. IEEE Computer Society, Los Alamitos, CA, 333--336."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066760"}],"event":{"name":"SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT '18"},"container-title":["Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3208950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205977.3208950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:02Z","timestamp":1750282862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3208950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,7]]},"references-count":17,"alternative-id":["10.1145\/3205977.3208950","10.1145\/3205977"],"URL":"https:\/\/doi.org\/10.1145\/3205977.3208950","relation":{},"subject":[],"published":{"date-parts":[[2018,6,7]]},"assertion":[{"value":"2018-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}