{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:40:10Z","timestamp":1756489210158,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3631991.3632027","type":"proceedings-article","created":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T12:06:10Z","timestamp":1703592370000},"page":"218-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SPBAC: A Semantic Policy-based Access Control for Database Query"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7261-754X","authenticated-orcid":false,"given":"Aaron","family":"Zhang","sequence":"first","affiliation":[{"name":"Faculty of Science, School of Computer Science, The University of Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1284-2710","authenticated-orcid":false,"given":"Alimire","family":"Kahaer","sequence":"additional","affiliation":[{"name":"Development, AssyriaSoft Data Lab, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3095-8717","authenticated-orcid":false,"given":"Gerald","family":"Weber","sequence":"additional","affiliation":[{"name":"Faculty of Science, School of Computer Science, The University of Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9192-0993","authenticated-orcid":false,"given":"Nalin","family":"Arachchilage","sequence":"additional","affiliation":[{"name":"Faculty of Science, School of Computer Science, The University of Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2023,12,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Access control (Mar","author":"Wikipedia","year":"2019","unstructured":"Wikipedia, Access control (Mar 2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"URL https:\/\/en.wikipedia.org\/wiki\/Access_control"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2007.98"},{"key":"e_1_3_2_1_4_1","unstructured":"D. Ferraiolo R. Kuhn Role-based access controls Nist.gov (1992) 554\u2013563."},{"key":"e_1_3_2_1_5_1","unstructured":"URL https:\/\/csrc.nist.gov\/publications\/detail\/conference-paper\/1992\/10\/13\/ role-based-access-controls"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_2_1_7_1","volume-title":"Role based access control | csrc","author":"CSRC","year":"2012","unstructured":"CSRC, Role based access control | csrc (2012)."},{"key":"e_1_3_2_1_8_1","unstructured":"URL https:\/\/csrc.nist.gov\/projects\/role-based-access-control"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"J. Deng L. Zhao X. Yuan Z. Tang Q. Guo Research on the role-based access control model and data security method Communications in Computer and Information Science (2021) 86\u201396doi:10.1007\/ 978-981-16-3150-4_8.","DOI":"10.1007\/978-981-16-3150-4_8"},{"key":"e_1_3_2_1_10_1","volume-title":"Dynamic data masking - sql server","author":"Van MSFT","year":"2022","unstructured":"VanMSFT, Dynamic data masking - sql server (2022)."},{"key":"e_1_3_2_1_11_1","unstructured":"URL https:\/\/docs.microsoft.com\/en-us\/sql\/relational-databases\/security\/ dynamic-data-masking?view=sql-server-ver16"},{"key":"e_1_3_2_1_12_1","volume-title":"Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)","author":"Klaus","year":"2012","unstructured":"Klaus, Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC), Springer Vieweg, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841121"}],"event":{"name":"WSSE 2023: 2023 The 5th World Symposium on Software Engineering","acronym":"WSSE 2023","location":"Tokyo Japan"},"container-title":["2023 The 5th World Symposium on Software Engineering (WSSE)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631991.3632027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631991.3632027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:07:18Z","timestamp":1756487238000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631991.3632027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":13,"alternative-id":["10.1145\/3631991.3632027","10.1145\/3631991"],"URL":"https:\/\/doi.org\/10.1145\/3631991.3632027","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2023-12-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}