{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:43:50Z","timestamp":1775054630839,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["883286"],"award-info":[{"award-number":["883286"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1145\/3444757.3485107","type":"proceedings-article","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T11:16:14Z","timestamp":1636456574000},"page":"71-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Dynamic and Scalable Enforcement of Access Control Policies for Big Data"],"prefix":"10.1145","author":[{"given":"Marco","family":"Anisetti","sequence":"first","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Claudio A.","family":"Ardagna","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Chiara","family":"Braghin","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Antongiacomo","family":"Polimeno","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Alessandro","family":"Balestrucci","sequence":"additional","affiliation":[{"name":"Consorzio CINI, Roma, Italy"}]}],"member":"320","published-online":{"date-parts":[[2021,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The general data protection regulation (gdpr) - regulation (eu) 2016\/679.  The general data protection regulation (gdpr) - regulation (eu) 2016\/679."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of EMCIS, Dubai, EAU","author":"Aissa M. M. B.","year":"2020","unstructured":"M. M. B. Aissa , L. Sfaxi , and R. Robbana . DECIDE: A new decisional big data methodology for a better data governance . In Proc. of EMCIS, Dubai, EAU , November 2020 . M. M. B. Aissa, L. Sfaxi, and R. Robbana. DECIDE: A new decisional big data methodology for a better data governance. In Proc. of EMCIS, Dubai, EAU, November 2020."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.181"},{"key":"e_1_3_2_1_4_1","volume-title":"Privacy-aware big data analytics as a service for public health policies in smart cities. Sustainable cities and society, 39:68--77","author":"Anisetti M.","year":"2018","unstructured":"M. Anisetti , C. Ardagna , V. Bellandi , M. Cremonini , F. Frati , and E. Damiani . Privacy-aware big data analytics as a service for public health policies in smart cities. Sustainable cities and society, 39:68--77 , 2018 . M. Anisetti, C. Ardagna, V. Bellandi, M. Cremonini, F. Frati, and E. Damiani. Privacy-aware big data analytics as a service for public health policies in smart cities. Sustainable cities and society, 39:68--77, 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"A guide to fully homomorphic encryption. IACR Cryptology ePrint Archive","author":"Armknecht F.","year":"2015","unstructured":"F. Armknecht , C. Boyd , C. Carr , K. Gj\u00f8steen , A. J\u00e4schke , C. A. Reuter , and M. Strand . A guide to fully homomorphic encryption. IACR Cryptology ePrint Archive , 2015 :1192, 2015. F. Armknecht, C. Boyd, C. Carr, K. Gj\u00f8steen, A. J\u00e4schke, C. A. Reuter, and M. Strand. A guide to fully homomorphic encryption. IACR Cryptology ePrint Archive, 2015:1192, 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.052"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0023-0"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.123"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0020-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427494"},{"key":"e_1_3_2_1_12_1","first-page":"21","volume-title":"Intelligent Data-Centric Systems","author":"Demchenko Y.","year":"2017","unstructured":"Y. Demchenko , F. Turkmen , C. de Laat , C.-H. Hsu , C. Blanchet , and C. Loomis . Chapter 2 - cloud computing infrastructure for data intensive applications. In Big Data Analytics for Sensor-Network Collected Intelligence , Intelligent Data-Centric Systems , pages 21 -- 62 . Academic Press , 2017 . Y. Demchenko, F. Turkmen, C. de Laat, C.-H. Hsu, C. Blanchet, and C. Loomis. Chapter 2 - cloud computing infrastructure for data intensive applications. In Big Data Analytics for Sensor-Network Collected Intelligence, Intelligent Data-Centric Systems, pages 21--62. Academic Press, 2017."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180457.3180463"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257649"},{"key":"e_1_3_2_1_17_1","volume-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST special publication, 800(162):1--54","author":"Hu V. C.","year":"2014","unstructured":"V. C. Hu , D. Ferraiolo , R. Kuhn , A. Schnitzer , K. Sandlin , R. Miller , and K. Scarfone . Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST special publication, 800(162):1--54 , 2014 . V. C. Hu, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, and K. Scarfone. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST special publication, 800(162):1--54, 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3108936"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_21_1","volume-title":"Syngress","author":"Shinder T. W.","year":"2013","unstructured":"T. W. Shinder , Y. Diogenes , and D. Littlejohn Shinder . Chapter 7 - Controlling Access to Your Environment with Authentication and Authorization . Syngress , 2013 . T. W. Shinder, Y. Diogenes, and D. Littlejohn Shinder. Chapter 7 - Controlling Access to Your Environment with Authentication and Authorization. Syngress, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427640"}],"event":{"name":"MEDES '21: International Conference on Management of Digital EcoSystems","location":"Virtual Event Tunisia","acronym":"MEDES '21","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 13th International Conference on Management of Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444757.3485107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3444757.3485107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:20Z","timestamp":1750197800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444757.3485107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":22,"alternative-id":["10.1145\/3444757.3485107","10.1145\/3444757"],"URL":"https:\/\/doi.org\/10.1145\/3444757.3485107","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"2021-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}