{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:37Z","timestamp":1755993757104,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1145\/3649158.3657038","type":"proceedings-article","created":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T18:21:05Z","timestamp":1719339665000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Static and Dynamic Analysis of a Usage Control System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5445-9461","authenticated-orcid":false,"given":"Ulrich","family":"Sch\u00f6pp","sequence":"first","affiliation":[{"name":"fortiss GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8877-6895","authenticated-orcid":false,"given":"Fathiyeh","family":"Faghih","sequence":"additional","affiliation":[{"name":"fortiss GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2107-1732","authenticated-orcid":false,"given":"Subhajit","family":"Bandopadhyay","sequence":"additional","affiliation":[{"name":"Huawei Technologies D\u00fcsseldorf &amp; City, University of London, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5684-1689","authenticated-orcid":false,"given":"Hussein","family":"Joumaa","sequence":"additional","affiliation":[{"name":"Huawei Technologies D\u00fcsseldorf &amp; University of Trento, Trento, Italy, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3106-566X","authenticated-orcid":false,"given":"Amjad","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Huawei Technologies D\u00fcsseldorf, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6838-4221","authenticated-orcid":false,"given":"Chuangjie","family":"Xu","sequence":"additional","affiliation":[{"name":"fortiss GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4730-9147","authenticated-orcid":false,"given":"Xin","family":"Ye","sequence":"additional","affiliation":[{"name":"fortiss GmbH, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9522-1863","authenticated-orcid":false,"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[{"name":"Huawei Technologies D\u00fcsseldorf &amp; University of Kent, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2010.20"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/506147.506151"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266473"},{"volume-title":"Computer Aided Verification. LNCS","author":"Backes John","key":"e_1_3_2_1_4_1","unstructured":"John Backes, Ulises Berrueco, Tyler Bray, Daniel Brim, Byron Cook, Andrew Gacek, Ranjit Jhala, Kasper Luckow, Sean McLaughlin, Madhav Menon, Daniel Peebles, Ujjwal Pugalia, Neha Rungta, Cole Schlesinger, Adam Schodde, Anvesh Tanuku, Carsten Varming, and Deepa Viswanathan. 2020. Stratified Abstraction of Access Control Policies. In Computer Aided Verification. LNCS, Vol. 12224. Springer, 165--176."},{"volume-title":"Semantic-based Automated Reasoning for AWS Access Policies using SMT. In 2018 Formal Methods in Computer Aided Design (FMCAD)","author":"Backes John","key":"e_1_3_2_1_5_1","unstructured":"John Backes, Pauline Bolignano, Byron Cook, Catherine Dodge, Andrew Gacek, Kasper Luckow, Neha Rungta, Oksana Tkachuk, and Carsten Varming. 2018. Semantic-based Automated Reasoning for AWS Access Policies using SMT. In 2018 Formal Methods in Computer Aided Design (FMCAD). IEEE, 1--9."},{"key":"e_1_3_2_1_6_1","volume-title":"VMCAI 2004 Venice, Italy, January 11--13, 2004 Proceedings 5. Springer, 44--57","author":"Barringer Howard","year":"2004","unstructured":"Howard Barringer, Allen Goldberg, Klaus Havelund, and Koushik Sen. 2004. Rule-based runtime verification. In Verification, Model Checking, and Abstract Interpretation: 5th International Conference, VMCAI 2004 Venice, Italy, January 11--13, 2004 Proceedings 5. Springer, 44--57."},{"key":"e_1_3_2_1_7_1","first-page":"19","article-title":"The MonPoly Monitoring Tool","volume":"3","author":"Basin David A","year":"2017","unstructured":"David A Basin, Felix Klaedtke, and Eugen Zalinescu. 2017. The MonPoly Monitoring Tool. RV-CuBES , Vol. 3 (2017), 19--28.","journal-title":"RV-CuBES"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000799.2000800"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.010"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIME.2005.26"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462704.1462709"},{"key":"e_1_3_2_1_12_1","volume-title":"Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, and Andrea Saracino.","author":"Dimitrakos Theo","year":"2020","unstructured":"Theo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, and Andrea Saracino. 2020. Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things. In Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 1801--1812."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45069-6_3"},{"key":"e_1_3_2_1_14_1","unstructured":"Andreas Eitel C Jung R Brandst\"adter A Hosseinzadeh S Bader C K\u00fchnle P Birnstill G Brost M Gall F Bruckner et al. 2021. Usage control in the international data spaces. Aufl. IDS Association Berlin (2021)."},{"volume-title":"Computer Aided Verification. LNCS","author":"Faymonville Peter","key":"e_1_3_2_1_15_1","unstructured":"Peter Faymonville, Bernd Finkbeiner, Malte Schledjewski, Maximilian Schwenger, Marvin Stenger, Leander Tentrup, and Hazem Torfah. 2019. StreamLAB: Stream-based Monitoring of Cyber-Physical Systems. In Computer Aided Verification. LNCS, Vol. 11561. Springer, 421--431."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Kathi Fisler Shriram Krishnamurthi Leo A Meyerovich and Michael Carl Tschantz. 2005. Veri?cation and Change-Impact Analysis of Access-Control Policies. 10.","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_17_1","volume-title":"Alessandro Rosetti, Hussein Joumaa, and Theo Dimitrakos.","author":"Hariri Ali","year":"2023","unstructured":"Ali Hariri, Amjad Ibrahim, Bithin Alangot, Subhajit Bandopadhyay, Antonio La Marra, Alessandro Rosetti, Hussein Joumaa, and Theo Dimitrakos. 2023. UCON: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer, 209--226."},{"volume-title":"Collaborative Approaches for Cyber Security in Cyber-Physical Systems","author":"Ibrahim Amjad","key":"e_1_3_2_1_18_1","unstructured":"Amjad Ibrahim and Theo Dimitrakos. 2023. Towards Collaborative Security Approaches Based on the European Digital Sovereignty Ecosystem. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer, 123--144."},{"key":"e_1_3_2_1_19_1","volume-title":"Hanne Riis Nielson, and Flemming Nielson","author":"Puspa Kencana Ramli Carroline Dewi","year":"2013","unstructured":"Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, and Flemming Nielson. 2013. XACML 3.0 in Answer Set Programming. In Logic-Based Program Synthesis and Transformation, , Elvira Albert (Ed.). Springer, 89--105."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242664"},{"key":"e_1_3_2_1_21_1","unstructured":"Prachi Kumari. 2015. Model-based policy derivation for usage control. Ph. D. Dissertation. Technische Universit\"at M\u00fcnchen."},{"key":"e_1_3_2_1_22_1","volume-title":"Conference on Logic Programming, Technical Communications (ICLP 2015) (CEUR Workshop Proceedings","volume":"13","author":"Lee Joohyung","year":"2015","unstructured":"Joohyung Lee, Yi Wang, and Yu Zhang. 2015. Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming. In Conference on Logic Programming, Technical Communications (ICLP 2015) (CEUR Workshop Proceedings, Vol. 1433). CEUR-WS.org, Aachen, 13."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 1st International Workshop on Data Ecosystems","volume":"3306","author":"Johannes Lohm\u00f6","year":"2022","unstructured":"Johannes Lohm\u00f6 ller, Jan Pennekamp, Roman Matzutt, and Klaus Wehrle. 2022. On the need for strong sovereignty in data ecosystems. In Proceedings of the 1st International Workshop on Data Ecosystems, Australia, Vol. 3306. CEUR-WS.org."},{"key":"e_1_3_2_1_24_1","unstructured":"OASIS. 2015. Abbreviated Language for Authorization V.1.0 WD 01."},{"key":"e_1_3_2_1_25_1","unstructured":"OASIS. 2017. eXtensible Access Control Markup Language (XACML) V.3.0 Err.01."},{"key":"e_1_3_2_1_26_1","unstructured":"Boris Otto Steffen Lohmann Sebastian Steinbuss Andreas Teuscher Soeren Auer Martin Boehmer Juergen Bohn Gerd Brost Jan Cirullies Constantin Ciureanu et al. 2018. IDS reference architecture model. version 2.0. (2018)."},{"key":"e_1_3_2_1_27_1","volume-title":"Michael ten Hompel, and Stefan Wrobel","author":"Otto Boris","year":"2022","unstructured":"Boris Otto, Michael ten Hompel, and Stefan Wrobel. 2022. Designing Data Spaces: The Ecosystem Approach to Competitive Advantage. Springer Nature."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151053"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.05.003"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-0421-5"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-005-6205-y"},{"volume-title":"Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies","author":"Schaad Andreas","key":"e_1_3_2_1_33_1","unstructured":"Andreas Schaad and Jonathan D. Moffett. 2002. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (Monterey, California, USA) (SACMAT '02). ACM, New York, NY, USA, 13--22."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589608.3593843"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)81051-X"}],"event":{"name":"SACMAT 2024: The 29th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio TX USA","acronym":"SACMAT 2024"},"container-title":["Proceedings of the 29th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649158.3657038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649158.3657038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:11:02Z","timestamp":1755915062000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649158.3657038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":35,"alternative-id":["10.1145\/3649158.3657038","10.1145\/3649158"],"URL":"https:\/\/doi.org\/10.1145\/3649158.3657038","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]},"assertion":[{"value":"2024-06-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}