{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T10:11:28Z","timestamp":1773223888548,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1936968"],"award-info":[{"award-number":["1936968"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359805","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"404-416","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Mining least privilege attribute based access control policies"],"prefix":"10.1145","author":[{"given":"Matthew W","family":"Sanders","sequence":"first","affiliation":[{"name":"Colorado School of Mines"}]},{"given":"Chuan","family":"Yue","sequence":"additional","affiliation":[{"name":"Colorado School of Mines"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the International Conference on Very Large Data Bases, VLDB","volume":"1215","author":"Agrawal Rakesh","year":"1994","unstructured":"Rakesh Agrawal , Ramakrishnan Srikant , 1994 . Fast algorithms for mining association rules . In Proceedings of the International Conference on Very Large Data Bases, VLDB , Vol. 1215 . 487--499. Rakesh Agrawal, Ramakrishnan Srikant, et al. 1994. Fast algorithms for mining association rules. In Proceedings of the International Conference on Very Large Data Bases, VLDB, Vol. 1215. 487--499."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Web Services. 2019. AWS CloudTrail. https:\/\/aws.amazon.com\/cloudtrail\/. Accessed: 2019-06-09.  Amazon Web Services. 2019. AWS CloudTrail. https:\/\/aws.amazon.com\/cloudtrail\/. Accessed: 2019-06-09."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon Web Services. 2019. AWS CloudTrail Log File Examples. https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/cloudtrail-log-file-examples.html. Accessed: 2019-06-09.  Amazon Web Services. 2019. AWS CloudTrail Log File Examples. https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/cloudtrail-log-file-examples.html. Accessed: 2019-06-09."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon Web Services. 2019. AWS Products and Services. https:\/\/aws.amazon.com\/products\/. Accessed: 2019-06-09.  Amazon Web Services. 2019. AWS Products and Services. https:\/\/aws.amazon.com\/products\/. Accessed: 2019-06-09."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952984"},{"key":"e_1_3_2_1_6_1","volume-title":"Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data mining and knowledge discovery 8, 1","author":"Han Jiawei","year":"2004","unstructured":"Jiawei Han , Jian Pei , Yiwen Yin , and Runying Mao . 2004. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data mining and knowledge discovery 8, 1 ( 2004 ), 53--87. Jiawei Han, Jian Pei, Yiwen Yin, and Runying Mao. 2004. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data mining and knowledge discovery 8, 1 (2004), 53--87."},{"key":"e_1_3_2_1_7_1","series-title":"Springer series in statistics New York","volume-title":"The elements of statistical learning","author":"Hastie Trevor","unstructured":"Trevor Hastie , Jerome Friedman , and Robert Tibshirani . 2001. The elements of statistical learning . Springer series in statistics New York , NY , USA. Trevor Hastie, Jerome Friedman, and Robert Tibshirani. 2001. The elements of statistical learning. Springer series in statistics New York, NY, USA."},{"key":"e_1_3_2_1_8_1","unstructured":"Vincent C Hu etal 2013. NIST 800-162: Guide to attribute based access control (ABAC) definition and considerations (Draft).  Vincent C Hu et al. 2013. NIST 800-162: Guide to attribute based access control (ABAC) definition and considerations (Draft)."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Jim\u00e9nez Carlos Cotrini","year":"2018","unstructured":"Carlos Cotrini Jim\u00e9nez , Thilo Weghorn , and David A. Basin . 2018. Mining ABAC Rules from Sparse Logs . Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P) ( 2018 ), 31--46. Carlos Cotrini Jim\u00e9nez, Thilo Weghorn, and David A. Basin. 2018. Mining ABAC Rules from Sparse Logs. Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P) (2018), 31--46."},{"key":"e_1_3_2_1_10_1","volume-title":"Brian Mac Namee, and Aoife D'Arcy","author":"Kelleher John D.","year":"2015","unstructured":"John D. Kelleher , Brian Mac Namee, and Aoife D'Arcy . 2015 . Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies. MIT Press . John D. Kelleher, Brian Mac Namee, and Aoife D'Arcy. 2015. Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies. MIT Press."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377840"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295145"},{"key":"e_1_3_2_1_13_1","unstructured":"Linux Kernel Organization. 2019. Ext4 Disk Layout. https:\/\/www.kernel.org\/doc\/html\/latest\/filesystems\/ext4\/index.html. Accessed: 2019-09-14.  Linux Kernel Organization. 2019. Ext4 Disk Layout. https:\/\/www.kernel.org\/doc\/html\/latest\/filesystems\/ext4\/index.html. Accessed: 2019-09-14."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140553"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176307"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_18_1","unstructured":"SANS Institute. 2019. A Compliance Primer for IT Professionals. https:\/\/www.sans.org\/reading-room\/whitepapers\/compliance\/compliance-primer-professionals-33538. Accessed: 2019-06-09.  SANS Institute. 2019. A Compliance Primer for IT Professionals. https:\/\/www.sans.org\/reading-room\/whitepapers\/compliance\/compliance-primer-professionals-33538. Accessed: 2019-06-09."},{"key":"e_1_3_2_1_19_1","unstructured":"Harold F Tipton and Kevin Henry. 2006. Official (ISC) 2 guide to the CISSP CBK. Auerbach Publications.  Harold F Tipton and Kevin Henry. 2006. Official (ISC) 2 guide to the CISSP CBK. Auerbach Publications."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_18"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369048"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359805","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:07Z","timestamp":1750202587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":21,"alternative-id":["10.1145\/3359789.3359805","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359805","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}