{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:09Z","timestamp":1750220709058,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,10]]},"DOI":"10.1145\/3381991.3395601","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T04:34:57Z","timestamp":1590726897000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Norm-based Access Control"],"prefix":"10.1145","author":[{"given":"Onuralp","family":"Ulusoy","sequence":"first","affiliation":[{"name":"Utrecht University, Utrecht, Netherlands"}]},{"given":"Pinar","family":"Yolum","sequence":"additional","affiliation":[{"name":"Utrecht University, Utrecht, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2343776.2343848"},{"key":"e_1_3_2_1_3_1","unstructured":"Md. Zulfikar Alom Barbara Carminati and Elena Ferrari. 2019. Helping Users Managing Context-Based Privacy Preferences Elisa Bertino Carl K. Chang Peter Chen Ernesto Damiani Michael Goul and Katsunori Oyama (Eds.). 100--107.  Md. Zulfikar Alom Barbara Carminati and Elena Ferrari. 2019. Helping Users Managing Context-Based Privacy Preferences Elisa Bertino Carl K. Chang Peter Chen Ernesto Damiani Michael Goul and Katsunori Oyama (Eds.). 100--107."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.02.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"volume-title":"Privacy and Utility in Business Processes. In 20th IEEE Computer Security Foundations Symposium (CSF'07)","year":"2007","author":"Barth Adam","key":"e_1_3_2_1_6_1"},{"volume-title":"MONPOLY: Monitoring Usage-Control Policies. In Runtime Verification","year":"2012","author":"Basin David","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897063"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542237"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-012-9128-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_3_2_1_12_1","unstructured":"Seda Gurses Carmela Troncoso and Claudia Diaz. 2011. Engineering Privacy by Design. Computers Privacy & Data Protection (2011).  Seda Gurses Carmela Troncoso and Claudia Diaz. 2011. Engineering Privacy by Design. Computers Privacy & Data Protection (2011)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888917000169"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158373"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003434"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Marc Langheinrich. 2001. Privacy by Design -- Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001: Ubiquitous Computing Gregory D. Abowd Barry Brumitt and Steven Shafer (Eds.). 273--291.  Marc Langheinrich. 2001. Privacy by Design -- Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001: Ubiquitous Computing Gregory D. Abowd Barry Brumitt and Steven Shafer (Eds.). 273--291.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898361"},{"volume-title":"Proceedings of the International Joint Conference on AI (IJCAI) . 373--379","year":"2016","author":"Mashayekhi Mehdi","key":"e_1_3_2_1_19_1"},{"volume-title":"Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies","author":"Mehregan Pooya","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2484920.2484998"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3146025"},{"volume-title":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy (CODASPY '16)","author":"Syed Zain","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"Norm Creation","volume":"7","author":"Roy Savarimuthu Bastin Tony","year":"2011","journal-title":"Multiagent Grid Syst."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the International Joint Conference on AI (IJCAI)","volume":"1507","author":"Sen Sandip","year":"2007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_3_2_1_31_1","unstructured":"Pang-Ning Tan Michael Steinbach and Vipin Kumar. 2005. Introduction to Data Mining (First Edition) .Addison-Wesley Longman Publishing Co. Inc.  Pang-Ning Tan Michael Steinbach and Vipin Kumar. 2005. Introduction to Data Mining (First Edition) .Addison-Wesley Longman Publishing Co. Inc."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205997"},{"key":"e_1_3_2_1_33_1","unstructured":"Raimo Tuomela. 1995. The Importance of Us: A Philosophical Study of Basic Social Norms .Stanford University Press.  Raimo Tuomela. 1995. The Importance of Us: A Philosophical Study of Basic Social Norms .Stanford University Press."},{"volume-title":"Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems","year":"2018","author":"Ulusoy Onuralp","key":"e_1_3_2_1_34_1"},{"volume-title":"Emergent Privacy Norms for Collaborative Systems. In PRIMA 2019: Principles and Practice of Multi-Agent Systems. Springer International Publishing, Cham, 514--522","year":"2019","author":"Ulusoy Onuralp","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","unstructured":"Piotr A. Wozniak Edward J. Gorzela?czyk and Janusz A. Murakowski. 1995. Two components of long-term memory. Acta neurobiologiae experimentalis Vol. 55 4 (1995) 301-305.  Piotr A. Wozniak Edward J. Gorzela?czyk and Janusz A. Murakowski. 1995. Two components of long-term memory. Acta neurobiologiae experimentalis Vol. 55 4 (1995) 301-305."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Matthew D. Zeiler and Rob Fergus. 2014. Visualizing and Understanding Convolutional Networks. In Computer Vision -- ECCV 2014 David Fleet Tomas Pajdla Bernt Schiele and Tinne Tuytelaars (Eds.). Cham 818--833.  Matthew D. Zeiler and Rob Fergus. 2014. Visualizing and Understanding Convolutional Networks. In Computer Vision -- ECCV 2014 David Fleet Tomas Pajdla Bernt Schiele and Tinne Tuytelaars (Eds.). Cham 818--833.","DOI":"10.1007\/978-3-319-10590-1_53"},{"volume-title":"Proceedings of the 21st ACM International Conference on Information and Knowledge Management","year":"2012","author":"Zerr Sergej","key":"e_1_3_2_1_38_1"}],"event":{"name":"SACMAT '20: The 25th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Barcelona Spain","acronym":"SACMAT '20"},"container-title":["Proceedings of the 25th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381991.3395601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3381991.3395601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381991.3395601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"references-count":38,"alternative-id":["10.1145\/3381991.3395601","10.1145\/3381991"],"URL":"https:\/\/doi.org\/10.1145\/3381991.3395601","relation":{},"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"2020-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}