{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:16:27Z","timestamp":1769847387027,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1564034, CNS-1624503, CNS-1747728"],"award-info":[{"award-number":["CNS-1564034, CNS-1624503, CNS-1747728"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R01GM118574, R35GM13492"],"award-info":[{"award-number":["R01GM118574, R35GM13492"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fullbright Program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447825","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"185-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Incremental Maintenance of ABAC Policies"],"prefix":"10.1145","author":[{"given":"Gunjan","family":"Batra","sequence":"first","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Loredana Caruccio Stefano Cirillo Vincenzo Deufemia and Giuseppe Polese. 2019. Incremental Discovery of Functional Dependencies with a Bit-vector Algorithm.. In SEBD .  Loredana Caruccio Stefano Cirillo Vincenzo Deufemia and Giuseppe Polese. 2019. Incremental Discovery of Functional Dependencies with a Bit-vector Algorithm.. In SEBD ."},{"key":"e_1_3_2_2_2_1","volume-title":"On the feasibility of attribute-based access control policy mining","author":"Chakraborty Shuvra","unstructured":"Shuvra Chakraborty , Ravi Sandhu , and Ram Krishnan . 2019. On the feasibility of attribute-based access control policy mining . In IEEE IRI . 245--252. Shuvra Chakraborty, Ravi Sandhu, and Ram Krishnan. 2019. On the feasibility of attribute-based access control policy mining. In IEEE IRI . 245--252."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1996.492094"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDEAS.2003.1214917"},{"key":"e_1_3_2_2_5_1","volume-title":"2018 IEEE European Symposium on Security and Privacy (EuroS P). 31--46","author":"Cotrini C.","unstructured":"C. Cotrini , T. Weghorn , and D. Basin . 2018. Mining ABAC Rules from Sparse Logs . In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 31--46 . C. Cotrini, T. Weghorn, and D. Basin. 2018. Mining ABAC Rules from Sparse Logs. In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 31--46."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2608519.2608522"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3084163"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Maanak Gupta James Benson Farhan Patwa and Ravi Sandhu. 2019. Dynamic groups and attribute-based access control for next-generation smart cars. In ACM CODASPY . 61--72.  Maanak Gupta James Benson Farhan Patwa and Ravi Sandhu. 2019. Dynamic groups and attribute-based access control for next-generation smart cars. In ACM CODASPY . 61--72.","DOI":"10.1145\/3292006.3300048"},{"key":"e_1_3_2_2_10_1","unstructured":"Padmavathi Iyer and Amirreza Masoumzadeh. 2018. Mining positive and negative attribute-based access control policy rules. In ACM SACMAT . 161--172.  Padmavathi Iyer and Amirreza Masoumzadeh. 2018. Mining positive and negative attribute-based access control policy rules. In ACM SACMAT . 161--172."},{"key":"e_1_3_2_2_11_1","unstructured":"Padmavathi Iyer and Amirreza Masoumzadeh. 2019. Generalized mining of relationship-based access control policies in evolving systems. In ACM SACMAT. 135--140.  Padmavathi Iyer and Amirreza Masoumzadeh. 2019. Generalized mining of relationship-based access control policies in evolving systems. In ACM SACMAT. 135--140."},{"key":"e_1_3_2_2_12_1","volume-title":"Polisma - A Framework for Learning Attribute-Based Access Control Policies. In 25th European Symposium on Research in Computer Security, Proceedings, Part I. Springer, 523--544","author":"Jabal Amani Abu","unstructured":"Amani Abu Jabal , Elisa Bertino , Jorge Lobo , Mark Law , Alessandra Russo , Seraphin B. Calo , and Dinesh C. Verma . 2020 . Polisma - A Framework for Learning Attribute-Based Access Control Policies. In 25th European Symposium on Research in Computer Security, Proceedings, Part I. Springer, 523--544 . Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin B. Calo, and Dinesh C. Verma. 2020. Polisma - A Framework for Learning Attribute-Based Access Control Policies. In 25th European Symposium on Research in Computer Security, Proceedings, Part I. Springer, 523--544."},{"key":"e_1_3_2_2_13_1","unstructured":"Leila Karimi Maryam Aldairi James Joshi and Mai Abdelhakim. 2020. An Automatic Attribute Based Access Control Policy Extraction from Access Logs.  Leila Karimi Maryam Aldairi James Joshi and Mai Abdelhakim. 2020. An Automatic Attribute Based Access Control Policy Extraction from Access Logs."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622037"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.072"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15934-8_24"},{"key":"e_1_3_2_2_17_1","volume-title":"proc. of the 18th International Multiconference, IS2015","author":"Mocanu DC","year":"2015","unstructured":"DC Mocanu , Fatih Turkmen , and Antonio Liotta . 2015 . Towards ABAC Policy Mining from Logs with Deep Learning . In proc. of the 18th International Multiconference, IS2015 (2015), 124--128. DC Mocanu, Fatih Turkmen, and Antonio Liotta. 2015. Towards ABAC Policy Mining from Logs with Deep Learning. In proc. of the 18th International Multiconference, IS2015 (2015), 124--128."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Ian Molloy Hong Chen Tiancheng Li Qihua Wang Ninghui Li Elisa Bertino Seraphin Calo and Jorge Lobo. 2008. Mining roles with semantic meanings. In ACM SACMAT. 21--30.  Ian Molloy Hong Chen Tiancheng Li Qihua Wang Ninghui Li Elisa Bertino Seraphin Calo and Jorge Lobo. 2008. Mining roles with semantic meanings. In ACM SACMAT. 21--30.","DOI":"10.1145\/1377836.1377840"},{"key":"e_1_3_2_2_19_1","unstructured":"Philipp Schirmer Thorsten Papenbrock Sebastian Kruse Felix Naumann Dennis Hempfing Torben Mayer and Daniel Neusch\"afer-Rube. 2019. DynFD: Functional Dependency Discovery in Dynamic Datasets.. In EDBT. 253--264.  Philipp Schirmer Thorsten Papenbrock Sebastian Kruse Felix Naumann Dennis Hempfing Torben Mayer and Daniel Neusch\"afer-Rube. 2019. DynFD: Functional Dependency Discovery in Dynamic Datasets.. In EDBT. 253--264."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00051"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2001.943739"},{"key":"e_1_3_2_2_22_1","volume-title":"Intelligent Systems Design and Applications","author":"Wang Shyue-Liang","unstructured":"Shyue-Liang Wang , Wen-Chieh Tsou , Jiann-Horng Lin , and Tzung-Pei Hong . 2003. Maintenance of discovered functional dependencies: Incremental deletion . In Intelligent Systems Design and Applications . Springer , 579--588. Shyue-Liang Wang, Wen-Chieh Tsou, Jiann-Horng Lin, and Tzung-Pei Hong. 2003. Maintenance of discovered functional dependencies: Incremental deletion. In Intelligent Systems Design and Applications. Springer, 579--588."},{"key":"e_1_3_2_2_23_1","first-page":"533","article-title":"Mining attribute-based access control policies","volume":"12","author":"Xu Zhongyuan","year":"2015","unstructured":"Zhongyuan Xu and Scott D Stoller . 2015 . Mining attribute-based access control policies . IEEE TDSC , Vol. 12 , 5 (2015), 533 -- 545 . Zhongyuan Xu and Scott D Stoller. 2015. Mining attribute-based access control policies. IEEE TDSC , Vol. 12, 5 (2015), 533--545.","journal-title":"IEEE TDSC"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3422337.3447825","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447825","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":22,"alternative-id":["10.1145\/3422337.3447825","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447825","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}