{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:32Z","timestamp":1750220072282,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1145\/3532105.3535033","type":"proceedings-article","created":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T14:29:57Z","timestamp":1654698597000},"page":"259-261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster: ASQL - Attribute Based Access Control Extension for SQL"],"prefix":"10.1145","author":[{"given":"Proteet","family":"Paul","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]},{"given":"Tushar","family":"Gupta","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, India"}]}],"member":"320","published-online":{"date-parts":[[2022,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3450323"},{"key":"e_1_3_2_2_2_1","volume-title":"Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800--162","author":"Hu Vincent C.","year":"2014","unstructured":"Vincent C. Hu , David Ferraiolo , Rick Kuhn , Adam Schnitzer , Kenneth Sandlin , Robert Miller , and Karen Scarfone . 2014. Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800--162 ( 2014 ). Vincent C. Hu, David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, and Karen Scarfone. 2014. Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800--162 (2014)."},{"key":"e_1_3_2_2_3_1","unstructured":"MySQL. [n.d.]. MySQL 8.0 Reference Manual.  MySQL. [n.d.]. MySQL 8.0 Reference Manual."},{"key":"e_1_3_2_2_4_1","unstructured":"Proteet Paul. 2022. Github Link. https:\/\/github.com\/proteetpaul\/mysql-server\/tree\/8.0_proteet_paul_ABAC  Proteet Paul. 2022. Github Link. https:\/\/github.com\/proteetpaul\/mysql-server\/tree\/8.0_proteet_paul_ABAC"},{"key":"e_1_3_2_2_5_1","volume-title":"Osborn","author":"Servos Daniel","year":"2017","unstructured":"Daniel Servos and Sylvia L . Osborn . 2017 . Current Research and Open Problems in Attribute-Based Access Control. Comput. Surveys 49, 4 (2017), 65:1--65:45. Daniel Servos and Sylvia L. Osborn. 2017. Current Research and Open Problems in Attribute-Based Access Control. Comput. Surveys 49, 4 (2017), 65:1--65:45."}],"event":{"name":"SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New York NY USA","acronym":"SACMAT '22"},"container-title":["Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532105.3535033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:14Z","timestamp":1750183754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":5,"alternative-id":["10.1145\/3532105.3535033","10.1145\/3532105"],"URL":"https:\/\/doi.org\/10.1145\/3532105.3535033","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"2022-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}