{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:20:35Z","timestamp":1758705635899,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375725","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"73-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Admin-CBAC"],"prefix":"10.1145","author":[{"given":"Clara","family":"Bertolissi","sequence":"first","affiliation":[{"name":"Aix-Marseille Universit\u00e9, CNRS, Marseille, France"}]},{"given":"Maribel","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978--3--319--64701--2_19"},{"unstructured":"A. Armando and S. Ranise. 2011. Automated Symbolic Analysis of ARBACPolicies. In Security and Trust Management J. Cuellar J. Lopez G. Barthe and A. Pretschner (Eds.). Springer Berlin Heidelberg 17--34.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1542207.1542238"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1410234.1410235"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1147\/JRD.2009.5429045"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-11747-3_11"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.ic.2014.07.009"},{"volume-title":"Proceedings of DBSEC 2007 (Lecture Notes in Computer Science). Springer","author":"Bertolissi C.","unstructured":"C. Bertolissi, M. Fern\u00e1ndez, and S. Barker. 2007. Dynamic Event-Based Access Control as Term Rewriting. In Data and Applications Security XXI. Proceedings of DBSEC 2007 (Lecture Notes in Computer Science). Springer, Berlin, Heidelberg.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2967973.2968605"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/SocialCom.2013.23"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2875491.2875498"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/762476.762478"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1377836.1377852"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1017\/S0960129518000270"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3292006.3300033"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/j.sysarc.2010.04.005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/300830.300834"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1062455.1062502"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/978--3--319--46298--1_21"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/360303.360333"},{"unstructured":"V. C. Hu D. Ferraiolo R. Kuhn A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2014. Guide to Attribute Based Access Control (ABAC) Definitions and Considerations. NIST Special Publication 800--162.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/CIC.2016.022"},{"doi-asserted-by":"crossref","unstructured":"X. Jin R. Krishnan and R. Sandhu. 2012. A Unified Attribute-Based Access Control Model Covering DAC MAC and RBAC. In Data and Applications Security and Privacy XXVI N. Cuppens-Boulahia F. Cuppens and J. Garcia-Alfaro (Eds.). Springer Berlin Heidelberg 41--55.","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-642-31540-4_4"},{"volume-title":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE Press, 120--131","author":"Kalam A.E.","unstructured":"A.A.E. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin. 2003. Organization based access control. In Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE Press, 120--131.","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/373256.373280"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1229285.1229305"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/3322431.3325416"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/TDSC.2015.2427834"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/300830.300839"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1007\/978--3--319--17040--4_12"},{"unstructured":"M. Tereszkowski-Kaminski and M. Fern\u00e1ndez. 2018. Implementation of CBAC administrative policies. Final Year Project King's College London.","key":"e_1_3_2_1_31_1"},{"unstructured":"Y. Zeng and M. Fern\u00e1ndez. 2016. Implementation of CBAC administrative policies. Final Year Project King's College London.","key":"e_1_3_2_1_32_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '20","name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375725"}},"subtitle":["An Administration Model for Category-Based Access Control"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":32,"alternative-id":["10.1145\/3374664.3375725","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375725","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}