{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:16:07Z","timestamp":1770290167008,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["OAC-2019163, OAC-2126148, and OAC-2019012."],"award-info":[{"award-number":["OAC-2019163, OAC-2126148, and OAC-2019012."]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1145\/3532105.3535037","type":"proceedings-article","created":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T14:29:57Z","timestamp":1654698597000},"page":"217-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["WiP: AABAC - Automated Attribute Based Access Control for Genomics Data"],"prefix":"10.1145","author":[{"given":"David","family":"Reddick","sequence":"first","affiliation":[{"name":"Tennessee Tech University, Cookeville, TN, USA"}]},{"given":"Justin","family":"Presley","sequence":"additional","affiliation":[{"name":"Tennessee Tech University, Cookeville, TN, USA"}]},{"given":"Frank Alex","family":"Feltus","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Susmit","family":"Shannigrahi","sequence":"additional","affiliation":[{"name":"Tennessee Tech University, Cookeville, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Online","year":"2022","unstructured":"2017. Homo sapiens (ID 359795) - BioProject - NCBI. https:\/\/www.ncbi.nlm.nih.gov\/bioproject\/359795 https:\/\/www.ncbi.nlm.nih.gov\/bioproject\/359795 , Online ; accessed 28. Apr. 2022 . 2017. Homo sapiens (ID 359795) - BioProject - NCBI. https:\/\/www.ncbi.nlm.nih.gov\/bioproject\/359795 https:\/\/www.ncbi.nlm.nih.gov\/bioproject\/359795, Online; accessed 28. Apr. 2022."},{"key":"#cr-split#-e_1_3_2_2_2_1.1","doi-asserted-by":"crossref","unstructured":"B. Abinaya and S. Santhi. 2021. A survey on genomic data by privacy-preserving techniques perspective. Comput. Biol. Chem. 93 (Aug 2021) 107538. https:\/\/doi.org\/10.1016\/j.compbiolchem.2021.107538 arXiv:34246892 10.1016\/j.compbiolchem.2021.107538","DOI":"10.1016\/j.compbiolchem.2021.107538"},{"key":"#cr-split#-e_1_3_2_2_2_1.2","doi-asserted-by":"crossref","unstructured":"B. Abinaya and S. Santhi. 2021. A survey on genomic data by privacy-preserving techniques perspective. Comput. Biol. Chem. 93 (Aug 2021) 107538. https:\/\/doi.org\/10.1016\/j.compbiolchem.2021.107538 arXiv:34246892","DOI":"10.1016\/j.compbiolchem.2021.107538"},{"key":"e_1_3_2_2_3_1","volume-title":"Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy (SP '07)","author":"Bethencourt John","year":"2007","unstructured":"John Bethencourt , Amit Sahai , and Brent Waters . 2007 . Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy (SP '07) . 321--334. https:\/\/doi.org\/10.1109\/SP.2007.11 10.1109\/SP.2007.11 John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy (SP '07). 321--334. https:\/\/doi.org\/10.1109\/SP.2007.11"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1162\/dint_a_00029"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control","author":"Mukherjee Subhojeet","unstructured":"Subhojeet Mukherjee , Indrakshi Ray , Indrajit Ray , Hossein Shirazi , Toan Ong , and Michael G. Kahn . 2017. Attribute Based Access Control for Healthcare Resources . In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control ( Scottsdale, Arizona, USA) (ABAC '17). Association for Computing Machinery, New York, NY, USA, 29--40. https:\/\/doi.org\/10.1145\/3041048.3041055 10.1145\/3041048.3041055 Subhojeet Mukherjee, Indrakshi Ray, Indrajit Ray, Hossein Shirazi, Toan Ong, and Michael G. Kahn. 2017. Attribute Based Access Control for Healthcare Resources. In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (Scottsdale, Arizona, USA) (ABAC '17). Association for Computing Machinery, New York, NY, USA, 29--40. https:\/\/doi.org\/10.1145\/3041048.3041055"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297428"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078874"},{"key":"e_1_3_2_2_8_1","volume-title":"Named Data Networking for Genomics Data Management and Integrated Workflows. Frontiers in Big Data 4 (2","author":"Ogle Cameron","year":"2021","unstructured":"Cameron Ogle , David Reddick , Coleman McKnight , Tyler Biggs , Rini Pauly , Stephen P. Ficklin , F. Alex Feltus , and Susmit Shannigrahi . 2021. Named Data Networking for Genomics Data Management and Integrated Workflows. Frontiers in Big Data 4 (2 2021 ). https:\/\/doi.org\/10.3389\/fdata.2021.582468 10.3389\/fdata.2021.582468 Cameron Ogle, David Reddick, Coleman McKnight, Tyler Biggs, Rini Pauly, Stephen P. Ficklin, F. Alex Feltus, and Susmit Shannigrahi. 2021. Named Data Networking for Genomics Data Management and Integrated Workflows. Frontiers in Big Data 4 (2 2021). https:\/\/doi.org\/10.3389\/fdata.2021.582468"},{"key":"e_1_3_2_2_9_1","volume-title":"Knoppers","author":"Phillips Mark","year":"2020","unstructured":"Mark Phillips , Fruzsina Moln\u00e1r-G\u00e1bor , Jan O. Korbel , Adrian Thorogood , Yann Joly , Don Chalmers , David Townend , and Bartha M . Knoppers . 2020 . Genomics: data sharing needs an international code of conduct. Nature 2021 578:7793 578 (2 2020), 31--33. Issue 7793. https:\/\/doi.org\/10.1038\/d41586-020-00082--9 10.1038\/d41586-020-00082--9 Mark Phillips, Fruzsina Moln\u00e1r-G\u00e1bor, Jan O. Korbel, Adrian Thorogood, Yann Joly, Don Chalmers, David Townend, and Bartha M. Knoppers. 2020. Genomics: data sharing needs an international code of conduct. Nature 2021 578:7793 578 (2 2020), 31--33. Issue 7793. https:\/\/doi.org\/10.1038\/d41586-020-00082--9"},{"key":"e_1_3_2_2_10_1","volume-title":"low-cost and rapid DNA sequencing using surface-coating techniques. bioRxiv (12","author":"Qin Yanzhe","year":"2020","unstructured":"Yanzhe Qin , Stephan Koehler , Shengming Zhao , Ruibin Mai , Zhuo Liu , and Hao Lu. 2020. High-throughput , low-cost and rapid DNA sequencing using surface-coating techniques. bioRxiv (12 2020 ), 2020.12.10.418962. https:\/\/doi.org\/10.1101\/2020.12.10.418962 10.1101\/2020.12.10.418962 Yanzhe Qin, Stephan Koehler, Shengming Zhao, Ruibin Mai, Zhuo Liu, and Hao Lu. 2020. High-throughput, low-cost and rapid DNA sequencing using surface-coating techniques. bioRxiv (12 2020), 2020.12.10.418962. https:\/\/doi.org\/10.1101\/2020.12.10.418962"},{"key":"e_1_3_2_2_11_1","volume-title":"Case Study of Attribute Based Access Control for Genomics Data Using Named Data Networking","author":"Reddick David","unstructured":"David Reddick , F. Alex Feltus , and Susmit Shannigrahi . 2022. Case Study of Attribute Based Access Control for Genomics Data Using Named Data Networking . In IEEE CCNC. David Reddick, F. Alex Feltus, and Susmit Shannigrahi. 2022. Case Study of Attribute Based Access Control for Genomics Data Using Named Data Networking. In IEEE CCNC."},{"key":"e_1_3_2_2_12_1","volume-title":"Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang.","author":"Zhang Lixia","year":"2014","unstructured":"Lixia Zhang , Alexander Afanasyev , Jeffrey Burke , Van Jacobson , kc claffy , Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang. 2014 . Named data networking. ACM SIGCOMM Computer Communication Review 44 (7 2014). Issue 3. https:\/\/doi.org\/10.1145\/2656877.2656887 10.1145\/2656877.2656887 Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, kc claffy, Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang. 2014. Named data networking. ACM SIGCOMM Computer Communication Review 44 (7 2014). Issue 3. https:\/\/doi.org\/10.1145\/2656877.2656887"},{"key":"e_1_3_2_2_13_1","volume-title":"Named Data Networking (NDN) Project. (10","author":"Zhang Lixia","year":"2010","unstructured":"Lixia Zhang , Deborah Estrin , Jeffrey Burke , Van Jacobson , Jim Thornton , K Diana , Beichuan Zhang , Gene Tsudik , Dan Massey , Christos Papadopoulos , Patrick Crowley , James D Thornton , and Diana K Smetters . 2010. Named Data Networking (NDN) Project. (10 2010 ). http:\/\/named-data.net\/techreports.html Lixia Zhang, Deborah Estrin, Jeffrey Burke, Van Jacobson, Jim Thornton, K Diana, Beichuan Zhang, Gene Tsudik, Dan Massey, Christos Papadopoulos, Patrick Crowley, James D Thornton, and Diana K Smetters. 2010. Named Data Networking (NDN) Project. (10 2010). http:\/\/named-data.net\/techreports.html"}],"event":{"name":"SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies","location":"New York NY USA","acronym":"SACMAT '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532105.3535037","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532105.3535037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:14Z","timestamp":1750183754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":14,"alternative-id":["10.1145\/3532105.3535037","10.1145\/3532105"],"URL":"https:\/\/doi.org\/10.1145\/3532105.3535037","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"2022-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}