{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:09Z","timestamp":1750220709612,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["NSF-IIS-1527268"],"award-info":[{"award-number":["NSF-IIS-1527268"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,10]]},"DOI":"10.1145\/3381991.3395615","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T04:34:57Z","timestamp":1590726897000},"page":"131-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies"],"prefix":"10.1145","author":[{"given":"Carlos E.","family":"Rubio-Medrano","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Luis","family":"Claramunt","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Shaishavkumar","family":"Jogani","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AT&T. 2020. XACML 3.0 . https:\/\/github.com\/att\/XACML . (2020).  AT&T. 2020. XACML 3.0 . https:\/\/github.com\/att\/XACML . (2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.03.008"},{"volume-title":"Proc. of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC '17)","author":"Bhatt S.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"K. Z. Bijon R. Krishnan and R. Sandhu. 2012. Risk-Aware RBAC Sessions .Springer Berlin Heidelberg.  K. Z. Bijon R. Krishnan and R. Sandhu. 2012. Risk-Aware RBAC Sessions .Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-35130-3_5"},{"volume-title":"Proc. of the 2012 ACM Conf. on Computer and Communications Security (CCS '12)","author":"Bilge L.","key":"e_1_3_2_1_5_1"},{"volume-title":"Proc. of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC'17)","author":"Brossard D.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proc. of the Int. Workshop on Security in Info. Sys. (ICEIS","year":"2013","author":"Liang","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/876661.876669"},{"volume-title":"Proc. of the 2005 ACM Workshop on Formal Methods in Sec. Eng. (FMSE '05)","author":"Chapin P.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"Computational and Mathematical Methods in Medicine 2015","volume":"265132","author":"Choi D.","year":"2015"},{"volume-title":"Proc. of the 9th ACM Symp. on Access Control Models and Technologies (SACMAT '04)","author":"Dimmock N.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"K. A. Farris S. R. McNamara A. Goldstein and G. Cybenko. 2016. A preliminary analysis of quantifying computer security vulnerability data in the wild. (2016) bibinfonumpages9825 - 9842 pages.  K. A. Farris S. R. McNamara A. Goldstein and G. Cybenko. 2016. A preliminary analysis of quantifying computer security vulnerability data in the wild. (2016) bibinfonumpages9825 - 9842 pages.","DOI":"10.1117\/12.2230589"},{"volume-title":"Proc. of the 2016 ACM International Workshop on Attribute Based Access Control (ABAC '16)","author":"Ferraiolo D.","key":"e_1_3_2_1_13_1"},{"volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Gambetta D.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"M. T. Goodrich M. Shin R. Tamassia and W. H. Winsborough. 2003. Authenticated Dictionaries for Fresh Attribute Credentials .Springer Berlin Heidelberg Berlin Heidelberg 332--347.  M. T. Goodrich M. Shin R. Tamassia and W. H. Winsborough. 2003. Authenticated Dictionaries for Fresh Attribute Credentials .Springer Berlin Heidelberg Berlin Heidelberg 332--347.","DOI":"10.1007\/3-540-44875-6_24"},{"key":"e_1_3_2_1_16_1","unstructured":"GRPC. 2019. IT Access Control and User Access Management Policy . https:\/\/www.gprc.ab.ca\/about\/administration\/policies\/fetch.php?ID=320 . (2019). [Online; accessed Sep-23--2019].  GRPC. 2019. IT Access Control and User Access Management Policy . https:\/\/www.gprc.ab.ca\/about\/administration\/policies\/fetch.php?ID=320 . (2019). [Online; accessed Sep-23--2019]."},{"key":"e_1_3_2_1_17_1","first-page":"162","article-title":"Guide to attribute based access control (ABAC) definition and considerations","volume":"800","author":"Hu V. C","year":"2014","journal-title":"NIST Special Publication"},{"volume-title":"An Attribute Based Framework for Risk-Adaptive Access Control Models. In 2011 Sixth International Conference on Availability, Reliability and Security . 236--241","author":"Kandala S.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_20_1","unstructured":"Margrave An API for XACML Policy Verification and Change Analysis. 2020. Margrave Continue Example . http:\/\/www.margrave-tool.org\/v1  Margrave An API for XACML Policy Verification and Change Analysis. 2020. Margrave Continue Example . http:\/\/www.margrave-tool.org\/v1"},{"key":"e_1_3_2_1_21_1","unstructured":"v2\/margrave\/versions\/01-01\/examples\/continue\/. (2020).  v2\/margrave\/versions\/01-01\/examples\/continue\/. (2020)."},{"volume-title":"Proc. of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT '19)","author":"Nath R.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"NHS Digital. 2019. Access Control Sample Policy . https:\/\/webarchive.nationalarchives.gov.uk\/20180307183605\/https:\/\/digital.nhs.uk\/cyber-security\/policy-and-good-practice-in-health-care\/access-control\/example-policy . (2019).  NHS Digital. 2019. Access Control Sample Policy . https:\/\/webarchive.nationalarchives.gov.uk\/20180307183605\/https:\/\/digital.nhs.uk\/cyber-security\/policy-and-good-practice-in-health-care\/access-control\/example-policy . (2019)."},{"volume-title":"Proc. of the 5th ACM Symp. on Information, Computer and Comm. Security (ASIACCS '10)","author":"Ni Q.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"OASIS Standard. 2013. eXtensible Access Control Markup Language (XACML) Version 3.0. (2013 January 22) . http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html . (2013). [Online; accessed September-23--2019].  OASIS Standard. 2013. eXtensible Access Control Markup Language (XACML) Version 3.0. (2013 January 22) . http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html . (2013). [Online; accessed September-23--2019]."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"W. Rautenberg. 2009. A Concise Introduction to Mathematical Logic 3rd ed.). Springer Publishing Company Incorporated.  W. Rautenberg. 2009. A Concise Introduction to Mathematical Logic 3rd ed.). Springer Publishing Company Incorporated.","DOI":"10.1007\/978-1-4419-1221-3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140553"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_30_1","unstructured":"SANS. 2019. SANS Consensus Policy Resource Community . https:\/\/www.sans.org\/security-resources\/policies\/network-security\/pdf\/remote-access-policy . (2019). [Online; accessed Sep-23--2019].  SANS. 2019. SANS Consensus Policy Resource Community . https:\/\/www.sans.org\/security-resources\/policies\/network-security\/pdf\/remote-access-policy . (2019). [Online; accessed Sep-23--2019]."},{"key":"e_1_3_2_1_31_1","volume-title":"Current Research and Open Problems in Attribute-Based Access Control. ACM Comput. Surv.","volume":"49","author":"Servos D.","year":"2017"},{"key":"e_1_3_2_1_32_1","unstructured":"State of North Carolina. 2019. Access Control Policy SCIO-SEC-301-00 . https:\/\/files.nc.gov\/ncdit\/documents\/Statewide_Policies\/SCIO_Access_Control.pdf . (2019). [Online; accessed Sep-23--2019].  State of North Carolina. 2019. Access Control Policy SCIO-SEC-301-00 . https:\/\/files.nc.gov\/ncdit\/documents\/Statewide_Policies\/SCIO_Access_Control.pdf . (2019). [Online; accessed Sep-23--2019]."},{"key":"e_1_3_2_1_33_1","unstructured":"The Asela Project. 2020. XACML Examples . https:\/\/svn.wso2.org\/repos\/wso2\/people\/asela\/xacml\/sample\/kmarket\/resources\/lib\/. (2020).  The Asela Project. 2020. XACML Examples . https:\/\/svn.wso2.org\/repos\/wso2\/people\/asela\/xacml\/sample\/kmarket\/resources\/lib\/. (2020)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041048.3041054"},{"volume-title":"Proc. of the 36th Annual Hawaii Int. Conf. on System Sciences","year":"2003","author":"Vaughn R. B.","key":"e_1_3_2_1_35_1"}],"event":{"name":"SACMAT '20: The 25th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Barcelona Spain","acronym":"SACMAT '20"},"container-title":["Proceedings of the 25th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381991.3395615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3381991.3395615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381991.3395615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"references-count":35,"alternative-id":["10.1145\/3381991.3395615","10.1145\/3381991"],"URL":"https:\/\/doi.org\/10.1145\/3381991.3395615","relation":{},"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"2020-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}