{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T23:19:37Z","timestamp":1776381577426,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CISCO","award":["2020-220329 (3696)"],"award-info":[{"award-number":["2020-220329 (3696)"]}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R35GM134927"],"award-info":[{"award-number":["R35GM134927"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3527293","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"1237-1239","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Enabling Attribute-Based Access Control in Linux Kernel"],"prefix":"10.1145","author":[{"given":"H.O. Sai","family":"Varshith","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Chung Tong Hu David F. Ferraiolo David R. Kuhn Adam Schnitzer Kenneth Sandlin Robert Miller and Karen Scarfone. 2019. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=927500  Chung Tong Hu David F. Ferraiolo David R. Kuhn Adam Schnitzer Kenneth Sandlin Robert Miller and Karen Scarfone. 2019. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=927500"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5010"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382215"},{"key":"e_1_3_2_2_4_1","volume-title":"Configuring the SELinux policy. NAI Labs Rep","author":"Smalley Stephen","year":"2002","unstructured":"Stephen Smalley . 2002. Configuring the SELinux policy. NAI Labs Rep ( 2002 ), 02--007. Stephen Smalley. 2002. Configuring the SELinux policy. NAI Labs Rep (2002), 02--007."},{"key":"e_1_3_2_2_5_1","article-title":"Performance and Resource Utilization of FUSE User-Space File Systems","volume":"15","author":"Reddy Vangoor Bharath Kumar","year":"2019","unstructured":"Bharath Kumar Reddy Vangoor , Prafful Agarwal , Manu Mathew , Arun Ramachandran , Swaminathan Sivaraman , Vasily Tarasov , and Erez Zadok . 2019 . Performance and Resource Utilization of FUSE User-Space File Systems . ACM Trans. Storage , Vol. 15 , 2, Article 15 (may 2019), pages 49 pages. Bharath Kumar Reddy Vangoor, Prafful Agarwal, Manu Mathew, Arun Ramachandran, Swaminathan Sivaraman, Vasily Tarasov, and Erez Zadok. 2019. Performance and Resource Utilization of FUSE User-Space File Systems. ACM Trans. Storage, Vol. 15, 2, Article 15 (may 2019), pages 49 pages.","journal-title":"ACM Trans. Storage"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453078"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan","acronym":"ASIA CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3527293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:28Z","timestamp":1750188688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":6,"alternative-id":["10.1145\/3488932.3527293","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3527293","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}