{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:17:03Z","timestamp":1773512223122,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,24]]},"DOI":"10.1145\/3589608.3593843","type":"proceedings-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T22:15:11Z","timestamp":1684966511000},"page":"193-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Specifying a Usage Control System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5445-9461","authenticated-orcid":false,"given":"Ulrich","family":"Sch\u00f6pp","sequence":"first","affiliation":[{"name":"fortiss GmbH, Research Institute of the Free State of Bavaria, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6838-4221","authenticated-orcid":false,"given":"Chuangjie","family":"Xu","sequence":"additional","affiliation":[{"name":"fortiss GmbH, Research Institute of the Free State of Bavaria, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3106-566X","authenticated-orcid":false,"given":"Amjad","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Huawei Technologies Duesseldorf GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8877-6895","authenticated-orcid":false,"given":"Fathiyeh","family":"Faghih","sequence":"additional","affiliation":[{"name":"fortiss GmbH, Research Institute of the Free State of Bavaria, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9522-1863","authenticated-orcid":false,"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[{"name":"Huawei Technologies Duesseldorf GmbH &amp; University of Kent, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,5,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266473"},{"key":"e_1_3_2_1_2_1","volume-title":"Semantic-based Automated Reasoning for AWS Access Policies using SMT. In 2018 Formal Methods in Computer Aided Design (FMCAD)","author":"Backes John","unstructured":"John Backes, Pauline Bolignano, Byron Cook, Catherine Dodge, Andrew Gacek, Kasper Luckow, Neha Rungta, Oksana Tkachuk, and Carsten Varming. 2018. Semantic-based Automated Reasoning for AWS Access Policies using SMT. In 2018 Formal Methods in Computer Aided Design (FMCAD). IEEE, 1--9."},{"key":"e_1_3_2_1_3_1","first-page":"3","article-title":"Session-dependent Usage Control for Big Data","volume":"10","author":"Baldi Gabriele","year":"2020","unstructured":"Gabriele Baldi, Yair Diaz, Theo Dimitrakos, Fabio Martinelli, Christina Michailidou, Paolo Mori, Oleksii Osliak, and Andrea Saracino. 2020. Session-dependent Usage Control for Big Data. Journal of Internet Services and Information Security, Vol. 10, 3 (Aug. 2020), 76--92.","journal-title":"Journal of Internet Services and Information Security"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.010"},{"key":"e_1_3_2_1_5_1","volume-title":"Improving the Policy Specification for Practical Access Control Systems. Ph.,D. Dissertation","author":"Chen Haining","unstructured":"Haining Chen. 2017. Improving the Policy Specification for Practical Access Control Systems. Ph.,D. Dissertation. Purdue University."},{"key":"e_1_3_2_1_6_1","volume-title":"Grids, P2P and Services Computing","author":"Colombo Maurizio","unstructured":"Maurizio Colombo, Aliaksandr Lazouski, Fabio Martinelli, and Paolo Mori. 2010. A Proposal on Enhancing XACML with Continuous Usage Control Features. In Grids, P2P and Services Computing. Springer, 133--146."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462704.1462709"},{"key":"e_1_3_2_1_8_1","volume-title":"Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, and Andrea Saracino.","author":"Dimitrakos Theo","year":"2020","unstructured":"Theo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, and Andrea Saracino. 2020. Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things. In Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 1801--1812."},{"key":"e_1_3_2_1_9_1","volume-title":"Risks and Security of Internet and Systems. LNCS","author":"Kateb Donia El","unstructured":"Donia El Kateb, Yehia ElRakaiby, Tejeddine Mouelhi, Iram Rubab, and Yves Le Traon. 2015. Towards a Full Support of Obligations in XACML. In Risks and Security of Internet and Systems. LNCS, Vol. 8924. Springer, 213--221."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384544.3384585"},{"key":"e_1_3_2_1_11_1","volume-title":"Alessandro Rosetti, Hussein Joumaa, and Theo Dimitrakos.","author":"Hariri Ali","year":"2023","unstructured":"Ali Hariri, Amjad Ibrahim, Bithin Alangot, Subhajit Bandopadhyay, Antonio La Marra, Alessandro Rosetti, Hussein Joumaa, and Theo Dimitrakos. 2023. UCON: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer, 209--226."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532105.3535039"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-008-0087-9"},{"key":"e_1_3_2_1_14_1","volume-title":"Collaborative Approaches for Cyber Security in Cyber-Physical Systems","author":"Ibrahim Amjad","unstructured":"Amjad Ibrahim and Theo Dimitrakos. 2023. Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer, 123--144."},{"key":"e_1_3_2_1_15_1","volume-title":"Hanne Riis Nielson, and Flemming Nielson","author":"Puspa Kencana Ramli Carroline Dewi","year":"2013","unstructured":"Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, and Flemming Nielson. 2013. XACML 3.0 in Answer Set Programming. In Logic-Based Program Synthesis and Transformation,, Elvira Albert (Ed.). Springer, 89--105."},{"key":"e_1_3_2_1_17_1","volume-title":"Trust, Privacy and Security in Digital Business. LNCS","author":"Lazouski Aliaksandr","unstructured":"Aliaksandr Lazouski, Fabio Martinelli, and Paolo Mori. 2012. A Prototype for Enforcing Usage Control Policies Based on XACML. In Trust, Privacy and Security in Digital Business. LNCS, Vol. 7449. Springer, 79--92."},{"key":"e_1_3_2_1_18_1","volume-title":"Conference on Logic Programming, Technical Communications (ICLP 2015) (CEUR Workshop Proceedings","volume":"13","author":"Lee Joohyung","year":"2015","unstructured":"Joohyung Lee, Yi Wang, and Yu Zhang. 2015. Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming. In Conference on Logic Programming, Technical Communications (ICLP 2015) (CEUR Workshop Proceedings, Vol. 1433). CEUR-WS.org, Aachen, 13."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133611"},{"key":"e_1_3_2_1_20_1","volume-title":"Answer Set Programming","author":"Lifschitz Vladimir","unstructured":"Vladimir Lifschitz. 2019. Answer Set Programming. Springer."},{"key":"e_1_3_2_1_21_1","volume-title":"Artificial Intelligence and Security. LNCS","author":"Lili Xie","unstructured":"Xie Lili and Zhai Zhigang. 2019. Formal Specification of Concurrent Enforcement UCON Model with CTL Logic. In Artificial Intelligence and Security. LNCS, Vol. 11633. Springer, 627--641."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the First International Workshop on Data Ecosystems co-located with 48th International Conference on Very Large Databases (VLDB","author":"Johannes Lohm\u00f6","year":"2022","unstructured":"Johannes Lohm\u00f6 ller, Jan Pennekamp, Roman Matzutt, and Klaus Wehrle. 2022. On the need for strong sovereignty in data ecosystems. In Proceedings of the First International Workshop on Data Ecosystems co-located with 48th International Conference on Very Large Databases (VLDB 2022), Sydney, Australia, September 5, 2022 (CEUR Workshop Proceedings, Vol. 3306), Cinzia Cappiello, Sandra Geisler, and Maria-Esther Vidal (Eds.). CEUR-WS.org, Aachen, 51--63."},{"key":"e_1_3_2_1_23_1","volume-title":"Parallel, Distributed and Network-Based Processing (PDP)","author":"Martinelli Fabio","unstructured":"Fabio Martinelli, Paolo Mori, Andrea Saracino, and Francesco Di Cerbo. 2019. Obligation Management in Usage Control Systems. In Parallel, Distributed and Network-Based Processing (PDP). IEEE, 356--364."},{"key":"e_1_3_2_1_24_1","unstructured":"OASIS. 2014. XACML v3.0 Administration and Delegation Profile V.1.0."},{"key":"e_1_3_2_1_25_1","unstructured":"OASIS. 2015. Abbreviated Language for Authorization V.1.0 WD 01."},{"key":"e_1_3_2_1_26_1","unstructured":"OASIS. 2017. eXtensible Access Control Markup Language (XACML) V.3.0 Err.01."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.05.003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-0421-5"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies","author":"Schaad Andreas","unstructured":"Andreas Schaad and Jonathan D. Moffett. 2002. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (Monterey, California, USA) (SACMAT '02). ACM, New York, NY, USA, 13--22."},{"key":"e_1_3_2_1_32_1","volume-title":"LUCON: Data Flow Control for Message-Based IoT Systems. In Trust, Security And Privacy In Computing And Communications \/ Big Data Science And Engineering (TrustCom\/BigDataSE)","author":"Schuette Julian","year":"2018","unstructured":"Julian Schuette and Gerd Stefan Brost. 2018. LUCON: Data Flow Control for Message-Based IoT Systems. In Trust, Security And Privacy In Computing And Communications \/ Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, New York, NY, USA, 289--299."},{"key":"e_1_3_2_1_33_1","volume-title":"Information Security. LNCS","author":"Zhang Nan","unstructured":"Nan Zhang, Mark Ryan, and Dimitar P. Guelev. 2005 b. Evaluating Access Control Policies Through Model Checking. In Information Security. LNCS, Vol. 3650. Springer, 446--460."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108906.1108908"}],"event":{"name":"SACMAT '23: The 28th ACM Symposium on Access Control Models and Technologies","location":"Trento Italy","acronym":"SACMAT '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 28th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589608.3593843","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589608.3593843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:45Z","timestamp":1750291425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589608.3593843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,24]]},"references-count":32,"alternative-id":["10.1145\/3589608.3593843","10.1145\/3589608"],"URL":"https:\/\/doi.org\/10.1145\/3589608.3593843","relation":{},"subject":[],"published":{"date-parts":[[2023,5,24]]},"assertion":[{"value":"2023-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}