{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:40:06Z","timestamp":1750207206204,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T00:00:00Z","timestamp":1559001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564034, CNS-1624503, CNS-1747728"],"award-info":[{"award-number":["CNS-1564034, CNS-1624503, CNS-1747728"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Institutes of Health","award":["R01GM118574"],"award-info":[{"award-number":["R01GM118574"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,28]]},"DOI":"10.1145\/3322431.3325102","type":"proceedings-article","created":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:37:16Z","timestamp":1559306236000},"page":"25-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["PolTree"],"prefix":"10.1145","author":[{"given":"Ronit","family":"Nath","sequence":"first","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]},{"given":"Saptarshi","family":"Das","sequence":"additional","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Vijay","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,28]]},"reference":[{"volume-title":"International Symposium on Integrated Network Management. 17--30","author":"Al-Shaer E. S.","key":"e_1_3_2_1_1_1","unstructured":"E. S. Al-Shaer and H. H. Hamed . 2003. Firewall policy advisor for anomaly discovery and rule editing . In International Symposium on Integrated Network Management. 17--30 . E. S. Al-Shaer and H. H. Hamed. 2003. Firewall policy advisor for anomaly discovery and rule editing. In International Symposium on Integrated Network Management. 17--30."},{"key":"e_1_3_2_1_2_1","volume-title":"An introduction to binary decision diagrams. Lecture notes, available online","author":"Andersen H. R.","year":"1997","unstructured":"H. R. Andersen . 1997. An introduction to binary decision diagrams. Lecture notes, available online , IT University of Copenhagen ( 1997 ). H. R. Andersen. 1997. An introduction to binary decision diagrams. Lecture notes, available online, IT University of Copenhagen (1997)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2010.034814"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.1989.63394"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/224841.225047"},{"volume-title":"IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 101--119","author":"Bui T.","key":"e_1_3_2_1_7_1","unstructured":"T. Bui , S. D. Stoller , and S. Sharma . 2017. Fast distributed evaluation of stateful attribute-based access control policies . In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 101--119 . T. Bui, S. D. Stoller, and S. Sharma. 2017. Fast distributed evaluation of stateful attribute-based access control policies. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 101--119."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"S. Das B. Mitra V. Atluri J. Vaidya and S. Sural. 2018. Policy Engineering in RBAC and ABAC. 24--54.  S. Das B. Mitra V. Atluri J. Vaidya and S. Sural. 2018. Policy Engineering in RBAC and ABAC. 24--54.","DOI":"10.1007\/978-3-030-04834-1_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Das S. Sural J. Vaidya and V. Atluri. 2018. HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control. IEEE Letters of the Computer Society (2018) 25--29.  S. Das S. Sural J. Vaidya and V. Atluri. 2018. HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control. IEEE Letters of the Computer Society (2018) 25--29.","DOI":"10.1109\/LOCS.2018.2889980"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3208949"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2015.98"},{"key":"e_1_3_2_1_12_1","unstructured":"V. C. Hu D. Ferraiolo D. R. Kuhn A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2014. Guide to Attribute-Based Access Control (ABAC) definition and considerations. Technical Report. NIST Special Publication 800--162. http:\/\/nvlpubs.nist.gov\/nistpubs\/-specialpublications\/NIST.sp.800--162.pdf  V. C. Hu D. Ferraiolo D. R. Kuhn A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2014. Guide to Attribute-Based Access Control (ABAC) definition and considerations. Technical Report. NIST Special Publication 800--162. http:\/\/nvlpubs.nist.gov\/nistpubs\/-specialpublications\/NIST.sp.800--162.pdf"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.32"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"e_1_3_2_1_15_1","unstructured":"S. Khummanee and K. Tientanopajai. 2016. The Policy Mapping Algorithm for High-speed Firewall Policy Verifying. International Journal of Network Security (2016) 433--444.  S. Khummanee and K. Tientanopajai. 2016. The Policy Mapping Algorithm for High-speed Firewall Policy Verifying. International Journal of Network Security (2016) 433--444."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.144618"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.07.003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078874"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"S. R. Safavian and D. Landgrebe. 1991. A survey of decision tree classifier methodology. IEEE transactions on systems man and cybernetics (1991) 660--674.  S. R. Safavian and D. Landgrebe. 1991. A survey of decision tree classifier methodology. IEEE transactions on systems man and cybernetics (1991) 660--674.","DOI":"10.1109\/21.97458"},{"key":"e_1_3_2_1_21_1","unstructured":"Y. Song and L. Ying. 2015. Decision tree methods: applications for classification and prediction. Shanghai archives of psychiatry (2015) 130--135.  Y. Song and L. Ying. 2015. Decision tree methods: applications for classification and prediction. Shanghai archives of psychiatry (2015) 130--135."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_18"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Z. Xu and S. D. Stoller. 2015. Mining Attribute-Based Access Control Policies. IEEE Transactions on Dependable and Secure Computing (2015) 533--545.  Z. Xu and S. D. Stoller. 2015. Mining Attribute-Based Access Control Policies. IEEE Transactions on Dependable and Secure Computing (2015) 533--545.","DOI":"10.1109\/TDSC.2014.2369048"}],"event":{"name":"SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto ON Canada","acronym":"SACMAT '19"},"container-title":["Proceedings of the 24th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322431.3325102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322431.3325102","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322431.3325102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:27Z","timestamp":1750206327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322431.3325102"}},"subtitle":["A Data Structure for Making Efficient Access Decisions in ABAC"],"short-title":[],"issued":{"date-parts":[[2019,5,28]]},"references-count":23,"alternative-id":["10.1145\/3322431.3325102","10.1145\/3322431"],"URL":"https:\/\/doi.org\/10.1145\/3322431.3325102","relation":{},"subject":[],"published":{"date-parts":[[2019,5,28]]},"assertion":[{"value":"2019-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}