{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:04:15Z","timestamp":1763535855433,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564034, CNS-1624503, CNS1747728"],"award-info":[{"award-number":["CNS-1564034, CNS-1624503, CNS1747728"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R01GM118574, R35GM134927"],"award-info":[{"award-number":["R01GM118574, R35GM134927"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CISCO University Research Program Fund, Silicon Valley Community Foundation","award":["2020-220329 (3696)"],"award-info":[{"award-number":["2020-220329 (3696)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3450323","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"317-319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Attribute-Based Access Control for NoSQL Databases"],"prefix":"10.1145","author":[{"given":"Eeshan","family":"Gupta","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-191315"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377838"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.123"},{"key":"e_1_3_2_2_4_1","volume-title":"Security Issues in NoSQL Databases. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 541--547","author":"Okman L.","year":"2011","unstructured":"Okman , L. , Gal-Oz , N. , Gonen , Y. , Gudes , E. , & Abramov , J. ( 2011 ). Security Issues in NoSQL Databases. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 541--547 . Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., & Abramov, J. (2011). Security Issues in NoSQL Databases. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 541--547."},{"key":"e_1_3_2_2_5_1","unstructured":"B-Engine Rankings. Retrieved January 9 2021 from https:\/\/db-engines.com\/en\/ranking  B-Engine Rankings. Retrieved January 9 2021 from https:\/\/db-engines.com\/en\/ranking"},{"key":"e_1_3_2_2_6_1","unstructured":"MongoDB Official Documentation. Retrieved January 9 2021 from https:\/\/docs.mongodb.com\/.  MongoDB Official Documentation. Retrieved January 9 2021 from https:\/\/docs.mongodb.com\/."},{"key":"e_1_3_2_2_7_1","volume-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations [includes updates as of 02-25-2019]","author":"Hu C.","year":"2019","unstructured":"Hu , C. , Ferraiolo , D.F. , Kuhn , D.R. , Schnitzer , A. , Sandlin , K. , Miller , R. , & Scarfone , K. ( 2019 ). Guide to Attribute Based Access Control (ABAC) Definition and Considerations [includes updates as of 02-25-2019] . Hu, C., Ferraiolo, D.F., Kuhn, D.R., Schnitzer, A., Sandlin, K., Miller, R., & Scarfone, K. (2019). Guide to Attribute Based Access Control (ABAC) Definition and Considerations [includes updates as of 02-25-2019]."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2497680"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450323","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3422337.3450323","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3450323","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3450323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":8,"alternative-id":["10.1145\/3422337.3450323","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3450323","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}