{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:40Z","timestamp":1750220680321,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447850","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"173-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Graph-Based Specification of Admin-CBAC Policies"],"prefix":"10.1145","author":[{"given":"Clara","family":"Bertolissi","sequence":"first","affiliation":[{"name":"Aix-Marseille Universit\u00e9, CNRS, Marseilles, France"}]},{"given":"Maribel","family":"Fernandez","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Dallas, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"volume-title":"NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. 257--272","author":"Ahmed T.","key":"e_1_3_2_2_1_1","unstructured":"T. Ahmed and R. Sandhu . 2017. Safety of ABAC? Is Decidable. In Network and System Security - 11th International Conference , NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. 257--272 . https:\/\/doi.org\/10.1007\/978-3-319-64701-2_19 T. Ahmed and R. Sandhu. 2017. Safety of ABAC? Is Decidable. In Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. 257--272. https:\/\/doi.org\/10.1007\/978-3-319-64701-2_19"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.10.018"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542238"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_11"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2014.07.009"},{"key":"e_1_3_2_2_6_1","volume-title":"Admin-CBAC: An Administration Model for Category-Based Access Control. In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","author":"Bertolissi C.","year":"2020","unstructured":"C. Bertolissi , M. Fern\u00e1ndez , and B. M. Thuraisingham . 2020 . Admin-CBAC: An Administration Model for Category-Based Access Control. In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy , New Orleans, LA, USA , March 16-18, 2020 , V. Roussev, B. M. Thuraisingham, B. Carminati, and M. Kantarcioglu (Eds.). ACM, 73--84. https:\/\/doi.org\/10.1145\/3374664.3375725 C. Bertolissi, M. Fern\u00e1ndez, and B. M. Thuraisingham. 2020. Admin-CBAC: An Administration Model for Category-Based Access Control. In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020, V. Roussev, B. M. Thuraisingham, B. Carminati, and M. Kantarcioglu (Eds.). ACM, 73--84. https:\/\/doi.org\/10.1145\/3374664.3375725"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.23"},{"key":"e_1_3_2_2_8_1","volume-title":"Graph Rewriting: An Algebraic and Logic Approach. In Handbook of Theoretical Computer Science","author":"Courcelle B.","year":"1990","unstructured":"B. Courcelle . 1990 . Graph Rewriting: An Algebraic and Logic Approach. In Handbook of Theoretical Computer Science , Volume B: Formal Models and Semantics, J. van Leeuwen (Ed.). Elsevier and MIT Press, 193-- 242 . B. Courcelle. 1990. Graph Rewriting: An Algebraic and Logic Approach. In Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics, J. van Leeuwen (Ed.). Elsevier and MIT Press, 193--242."},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings 8th International Workshop on Computing with Terms and Graphs, TERMGRAPH 2014","author":"Eguchi N.","year":"2014","unstructured":"N. Eguchi . 2014 . Complexity Analysis of Precedence Terminating Infinite Graph Rewrite Systems . In Proceedings 8th International Workshop on Computing with Terms and Graphs, TERMGRAPH 2014 , Vienna, Austria , July 13, 2014 (EPTCS), Aart Middeldorp and Femke van Raamsdonk (Eds.), Vol. 183. 33--47. https: \/\/doi.org\/10.4204\/EPTCS.183.3 N. Eguchi. 2014. Complexity Analysis of Precedence Terminating Infinite Graph Rewrite Systems. In Proceedings 8th International Workshop on Computing with Terms and Graphs, TERMGRAPH 2014, Vienna, Austria, July 13, 2014 (EPTCS), Aart Middeldorp and Femke van Raamsdonk (Eds.), Vol. 183. 33--47. https: \/\/doi.org\/10.4204\/EPTCS.183.3"},{"volume-title":"Handbook of Graph Grammars and Computing by Graph Transformation","author":"Ehrig H","key":"e_1_3_2_2_10_1","unstructured":"H Ehrig , G Engels , H-J Kreowski , and G Rozenberg . 1999. Handbook of Graph Grammars and Computing by Graph Transformation , Volume 2 . World Scientific . https:\/\/doi.org\/10.1142\/4180 arXiv:https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/4180 H Ehrig, G Engels, H-J Kreowski, and G Rozenberg. 1999. Handbook of Graph Grammars and Computing by Graph Transformation, Volume 2. World Scientific. https:\/\/doi.org\/10.1142\/4180 arXiv:https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/4180"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129518000270"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300033"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_2_14_1","volume-title":"An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. In 2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016","author":"Jha S.","year":"2016","unstructured":"S. Jha , S. Sural , V. Atluri , and J. Vaidya . 2016 . An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. In 2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016 , Pittsburgh, PA, USA , November 1-3, 2016 . IEEE Press, 64--73. https:\/\/doi.org\/10. 1109\/CIC.2016.022 S. Jha, S. Sural, V. Atluri, and J. Vaidya. 2016. An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. In 2nd IEEE International Conference on Collaboration and Internet Computing, CIC 2016, Pittsburgh, PA, USA, November 1-3, 2016. IEEE Press, 64--73. https:\/\/doi.org\/10. 1109\/CIC.2016.022"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5010"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"X. Jin R. Krishnan and R. Sandhu. 2012. A Unified Attribute-Based Access Control Model Covering DAC MAC and RBAC. In Data and Applications Security and Privacy XXVI N. Cuppens-Boulahia F. Cuppens and J. Garcia-Alfaro (Eds.). Springer Berlin Heidelberg 41--55.  X. Jin R. Krishnan and R. Sandhu. 2012. A Unified Attribute-Based Access Control Model Covering DAC MAC and RBAC. In Data and Applications Security and Privacy XXVI N. Cuppens-Boulahia F. Cuppens and J. Garcia-Alfaro (Eds.). Springer Berlin Heidelberg 41--55.","DOI":"10.1007\/978-3-642-31540-4_4"},{"volume-title":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE Press, 120--131","author":"Kalam A.A.E.","key":"e_1_3_2_2_17_1","unstructured":"A.A.E. Kalam , R. E. Baida , P. Balbiani , S. Benferhat , F. Cuppens , Y. Deswarte , A. Miege , C. Saurel , and G. Trouessin . 2003. Organization based access control . In Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE Press, 120--131 . A.A.E. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin. 2003. Organization based access control. In Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE Press, 120--131."},{"key":"e_1_3_2_2_18_1","volume-title":"Proc. of SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies","author":"Koch M.","year":"2004","unstructured":"M. Koch , L. Mancini , and F. Parisi-Presicce . 2004. A Graph Based Formalism for RBAC . In Proc. of SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies , New York, USA , 2004 . 129--187. M. Koch, L. Mancini, and F. Parisi-Presicce. 2004. A Graph Based Formalism for RBAC. In Proc. of SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, New York, USA, 2004. 129--187."},{"key":"e_1_3_2_2_19_1","volume-title":"6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001","author":"Koch M.","year":"2001","unstructured":"M. Koch , L. V. Mancini , and F. Parisi-Presicce . 2001. On the specification and evolution of access control policies . In 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001 , Litton-TASC, Chantilly, Virginia, USA , May 3-4, 2001 . ACM Press, New York, 121--130. https:\/\/doi.org\/10.1145\/373256. 373280 M. Koch, L. V. Mancini, and F. Parisi-Presicce. 2001. On the specification and evolution of access control policies. In 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001. ACM Press, New York, 121--130. https:\/\/doi.org\/10.1145\/373256. 373280"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007","author":"Li N.","year":"2007","unstructured":"N. Li and Z. Mao . 2007. Administration in role-based access control . In Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007 , Singapore , March 20-22, 2007 . ACM Press, New York, 127--138. https:\/\/doi.org\/10.1145\/1229285.1229305 N. Li and Z. Mao. 2007. Administration in role-based access control. In Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007. ACM Press, New York, 127--138. https:\/\/doi.org\/10.1145\/1229285.1229305"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325416"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2012.03119.x"},{"key":"e_1_3_2_2_23_1","volume-title":"21st International Workshop, WG '95, Aachen, Germany, June 20-22, 1995, Proceedings (Lecture Notes in Computer Science), . Nagl (Ed.)","volume":"1017","author":"Plump D.","year":"1995","unstructured":"D. Plump . 1995 . On Termination of Graph Rewriting. In Graph-Theoretic Concepts in Computer Science , 21st International Workshop, WG '95, Aachen, Germany, June 20-22, 1995, Proceedings (Lecture Notes in Computer Science), . Nagl (Ed.) , Vol. 1017 . Springer, 88--100. https:\/\/doi.org\/10.1007\/3-540-60618-1_68 D. Plump. 1995. On Termination of Graph Rewriting. In Graph-Theoretic Concepts in Computer Science, 21st International Workshop, WG '95, Aachen, Germany, June 20-22, 1995, Proceedings (Lecture Notes in Computer Science), . Nagl (Ed.), Vol. 1017. Springer, 88--100. https:\/\/doi.org\/10.1007\/3-540-60618-1_68"},{"volume-title":"Term Graph Rewriting","author":"Plump D.","key":"e_1_3_2_2_24_1","unstructured":"D. Plump . 1999. Term Graph Rewriting . World Scientific Publishing Co., Inc. , USA , 3--61. D. Plump. 1999. Term Graph Rewriting. World Scientific Publishing Co., Inc., USA, 3--61."},{"key":"e_1_3_2_2_25_1","volume-title":"Third International Conference, CAI 2009, Thessaloniki, Greece, May 19-22, 2009, Proceedings (Lecture Notes in Computer Science), Symeon Bozapalidis and George Rahonis (Eds.)","volume":"5725","author":"Plump D.","year":"2009","unstructured":"D. Plump . 2009 . The Graph Programming Language GP. In Algebraic Informatics , Third International Conference, CAI 2009, Thessaloniki, Greece, May 19-22, 2009, Proceedings (Lecture Notes in Computer Science), Symeon Bozapalidis and George Rahonis (Eds.) , Vol. 5725 . Springer, 99--122. https:\/\/doi.org\/10.1007\/978-3-642-03564-7_6 D. Plump. 2009. The Graph Programming Language GP. In Algebraic Informatics, Third International Conference, CAI 2009, Thessaloniki, Greece, May 19-22, 2009, Proceedings (Lecture Notes in Computer Science), Symeon Bozapalidis and George Rahonis (Eds.), Vol. 5725. Springer, 99--122. https:\/\/doi.org\/10.1007\/978-3-642-03564-7_6"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.225.6"},{"volume-title":"Graph Transformation, Specifications, and Nets - In Memory of Hartmut Ehrig (Lecture Notes in Computer Science)","author":"Plump D.","key":"e_1_3_2_2_27_1","unstructured":"D. Plump . 2018. Modular Termination of Graph Transformation . In Graph Transformation, Specifications, and Nets - In Memory of Hartmut Ehrig (Lecture Notes in Computer Science) , Reiko Heckel and Gabriele Taentzer (Eds.), Vol. 10800 . Springer , 231--244. https:\/\/doi.org\/10.1007\/978-3-319-75396-6_13 D. Plump. 2018. Modular Termination of Graph Transformation. In Graph Transformation, Specifications, and Nets - In Memory of Hartmut Ehrig (Lecture Notes in Computer Science), Reiko Heckel and Gabriele Taentzer (Eds.), Vol. 10800. Springer, 231--244. https:\/\/doi.org\/10.1007\/978-3-319-75396-6_13"},{"key":"e_1_3_2_2_28_1","volume-title":"Foundations. World Scientific.","author":"Rozenberg Grzegorz","year":"1997","unstructured":"Grzegorz Rozenberg (Ed.). 1997 . Handbook of Graph Grammars and Computing by Graph Transformations , Volume 1 : Foundations. World Scientific. Grzegorz Rozenberg (Ed.). 1997. Handbook of Graph Grammars and Computing by Graph Transformations, Volume 1: Foundations. World Scientific."},{"volume-title":"Proc. 4th ACM Workshop on Role-Based Access Control. 47--61","author":"Sandhu R.","key":"e_1_3_2_2_29_1","unstructured":"R. Sandhu , D. Ferraiolo , and R. Kuhn . 2000. The NIST Model for Role-based Access Control: Towards a Unified Standard . In Proc. 4th ACM Workshop on Role-Based Access Control. 47--61 . R. Sandhu, D. Ferraiolo, and R. Kuhn. 2000. The NIST Model for Role-based Access Control: Towards a Unified Standard. In Proc. 4th ACM Workshop on Role-Based Access Control. 47--61."},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings Tenth International Workshop on Computing with Terms and Graphs, TERMGRAPH@FSCD 2018","author":"Varga J.","year":"2018","unstructured":"J. Varga . 2018 . Finding the Transitive Closure of Functional Dependencies using Strategic Port Graph Rewriting . In Proceedings Tenth International Workshop on Computing with Terms and Graphs, TERMGRAPH@FSCD 2018 , Oxford, UK, 7th July 2018 (EPTCS), Maribel Fern\u00e1ndez and Ian Mackie (Eds.), Vol. 288. 50--62. https:\/\/doi.org\/10.4204\/EPTCS.288.5 J. Varga. 2018. Finding the Transitive Closure of Functional Dependencies using Strategic Port Graph Rewriting. In Proceedings Tenth International Workshop on Computing with Terms and Graphs, TERMGRAPH@FSCD 2018, Oxford, UK, 7th July 2018 (EPTCS), Maribel Fern\u00e1ndez and Ian Mackie (Eds.), Vol. 288. 50--62. https:\/\/doi.org\/10.4204\/EPTCS.288.5"},{"key":"e_1_3_2_2_31_1","volume-title":"Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010","author":"Zhang D.","year":"2010","unstructured":"D. Zhang , K. Ramamohanarao , S. Versteeg , and R. Zhang . 2010. Graph based strategies to role engineering . In Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010 , Oak Ridge, TN, USA , April 21-23, 2010 , Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, and Axel W. Krings (Eds.). ACM, 25. https:\/\/doi.org\/10.1145\/1852666.1852694 D. Zhang, K. Ramamohanarao, S. Versteeg, and R. Zhang. 2010. Graph based strategies to role engineering. In Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010, Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, and Axel W. Krings (Eds.). ACM, 25. https:\/\/doi.org\/10.1145\/1852666.1852694"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447850","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447850"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":31,"alternative-id":["10.1145\/3422337.3447850","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447850","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}