{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T18:09:42Z","timestamp":1762625382946,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":100,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JST SPRING","award":["JPMJSP2123"],"award-info":[{"award-number":["JPMJSP2123"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713656","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:20:47Z","timestamp":1745464847000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Transparent Barriers: Natural Language Access Control Policies for XR-Enhanced Everyday Objects"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5713-9331","authenticated-orcid":false,"given":"Kentaro","family":"Taninaka","sequence":"first","affiliation":[{"name":"Graduate School of Media and Governance, Keio University, Fujisawa, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3723-5482","authenticated-orcid":false,"given":"Rahul","family":"Jain","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5159-2235","authenticated-orcid":false,"given":"Jingyu","family":"Shi","sequence":"additional","affiliation":[{"name":"Elmore Family School of Electrical and Computer Engineering, Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9519-7965","authenticated-orcid":false,"given":"Kazunori","family":"Takashio","sequence":"additional","affiliation":[{"name":"Faculty of Environment and Information Studies, Keio University, Fujisawa-shi, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8639-5135","authenticated-orcid":false,"given":"Karthik","family":"Ramani","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641897"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313150.3313219"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347884"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1709886.1709897"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148090"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","unstructured":"Manar Alohaly Hassan Takabi and Eduardo Blanco. 2019. Automated extraction of attributes from natural language attribute-based access control (ABAC) policies. Cybersecurity 2 1 (2019) 2. 10.1186\/s42400-018-0019-2 Publisher: Springer.","DOI":"10.1186\/s42400-018-0019-2"},{"key":"e_1_3_3_3_8_2","unstructured":"Anne Anderson Anthony Nadalin B. Parducci D. Engovatov H. Lockhart M. Kudo P. Humenn S. Godik S. Anderson and S. Crocker. 2003. extensible access control markup language (xacml) version 1.0. Oasis (2003). http:\/\/xml.coverpages.org\/XACMLv20CD-CoreSpec.pdf"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-67"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300286"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","unstructured":"James\u00a0B. Avey Bruce\u00a0J. Avolio Craig\u00a0D. Crossley and Fred Luthans. 2009. Psychological ownership: theoretical extensions measurement and relation to work outcomes. J Organ Behavior 30 2 (Feb. 2009) 173\u2013191. 10.1002\/job.583","DOI":"10.1002\/job.583"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","unstructured":"Fleura Bardhi and Giana\u00a0M. Eckhardt. 2012. Access-Based Consumption: The Case of Car Sharing. Journal of Consumer Research 39 4 (Dec. 2012) 881\u2013898. 10.1086\/666376","DOI":"10.1086\/666376"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343055.3359700"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3311823.3311853"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","unstructured":"Russell\u00a0W. Belk. 1988. Possessions and the Extended Self. Journal of Consumer Research 15 2 (Sept. 1988) 139\u2013168. 10.1086\/209154","DOI":"10.1086\/209154"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/288392.288598"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWAR.1999.803804"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596090"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005959"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753499"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589608.3593839"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641717"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","unstructured":"Matthew Corbett Jiacheng Shang and Bo Ji. [n. d.]. GazePair: Efficient Pairing of Augmented Reality Devices Using Gaze Tracking. 23 3 ([n. d.]) 2407\u20132421. 10.1109\/TMC.2023.3255841 Conference Name: IEEE Transactions on Mobile Computing.","DOI":"10.1109\/TMC.2023.3255841"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468732"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Telli Davoodi Laura\u00a0J. Nelson and Peter\u00a0R. Blake. 2020. Children\u2019s Conceptions of Ownership for Self and Other: Categorical Ownership Versus Strength of Claim. Child Development 91 1 (Jan. 2020) 163\u2013178. 10.1111\/cdev.13163","DOI":"10.1111\/cdev.13163"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-08"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990850"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","unstructured":"Jaybie\u00a0A. De\u00a0Guzman Kanchana Thilakarathna and Aruna Seneviratne. 2019. Security and privacy approaches in mixed reality: A literature survey. ACM Computing Surveys (CSUR) 52 6 (2019) 1\u201337. 10.1145\/3359626 Publisher: ACM New York NY USA.","DOI":"10.1145\/3359626"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3654777.3676379"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376537"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3430524.3442460"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519911"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","unstructured":"Ori Friedman and Karen\u00a0R. Neary. 2008. Determining who owns what: Do children infer ownership from first possession? Cognition 107 3 (June 2008) 829\u2013849. 10.1016\/j.cognition.2007.12.002","DOI":"10.1016\/j.cognition.2007.12.002"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581142"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","unstructured":"Mac Greenslade Adrian Clark and Stephan Lukosch. 2023. Using Everyday Objects as Props for Virtual Objects in First Person Augmented Reality Games: An Elicitation Study. Proc. ACM Hum.-Comput. Interact. 7 CHI PLAY (Sept. 2023) 856\u2013875. 10.1145\/3611052","DOI":"10.1145\/3611052"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67822-77"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","unstructured":"Violet\u00a0Yinuo Han Hyunsung Cho Kiyosu Maeda Alexandra Ion and David Lindlbauer. 2023. BlendMR: A Computational Method to Create Ambient Mixed Reality Interfaces. Proceedings of the ACM on Human-Computer Interaction 7 ISS (2023) 217\u2013241. 10.1145\/3626472 Publisher: ACM New York NY USA.","DOI":"10.1145\/3626472"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047255"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580704"},{"key":"e_1_3_3_3_41_2","first-page":"255","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}}). In 27th USENIX Security Symposium (USENIX Security 18). 255\u2013272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he"},{"key":"e_1_3_3_3_42_2","volume-title":"Mine!: How the hidden rules of ownership control our lives","author":"Heller Michael\u00a0A.","year":"2022","unstructured":"Michael\u00a0A. Heller and James Salzman. 2022. Mine!: How the hidden rules of ownership control our lives. Anchor."},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858134"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops51409.2021.9431115"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8798358"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","unstructured":"Bret Jackson Linda Lor and Brianna\u00a0C. Heggeseth. 2024. Workspace Guardian: Investigating Awareness of Personal Workspace Between Co-Located Augmented Reality Users. IEEE Transactions on Visualization and Computer Graphics (2024). 10.1109\/TVCG.2024.3372073 Publisher: IEEE.","DOI":"10.1109\/TVCG.2024.3372073"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/FUTURETECH.2010.5482712"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606793"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","unstructured":"Sakuna\u00a0Harinda Jayasundara Nalin\u00a0Asanka Gamagedara\u00a0Arachchilage and Giovanni Russello. [n. d.]. SoK: Access Control Policy Generation from High-level Natural Language Requirements. 57 4 ([n. d.]) 102:1\u2013102:37. 10.1145\/3706057","DOI":"10.1145\/3706057"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","unstructured":"Rebecca Jenkins Mike Molesworth and Richard Scullion. 2014. The messy social lives of objects: Inter\u2010personal borrowing and the ambiguity of possession and ownership. J of Consumer Behaviour 13 2 (March 2014) 131\u2013139. 10.1002\/cb.1469","DOI":"10.1002\/cb.1469"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","unstructured":"Dongsik Jo and Gerard\u00a0Jounghyun Kim. 2016. ARIoT: scalable augmented reality framework for interacting with Internet of Things appliances everywhere. IEEE Transactions on Consumer Electronics 62 3 (2016) 334\u2013340. 10.1109\/TCE.2016.7613201 Publisher: IEEE.","DOI":"10.1109\/TCE.2016.7613201"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.28"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300476"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","unstructured":"Leila Karimi Maryam Aldairi James Joshi and Mai Abdelhakim. 2021. An automatic attribute-based access control policy extraction from access logs. IEEE Transactions on Dependable and Secure Computing 19 4 (2021) 2304\u20132317. 10.1109\/TDSC.2021.3054331 Publisher: IEEE.","DOI":"10.1109\/TDSC.2021.3054331"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","unstructured":"Sunae Kim and Charles\u00a0W. Kalish. 2009. Children\u2019s ascriptions of property rights with changes of ownership. Cognitive Development 24 3 (July 2009) 322\u2013336. 10.1016\/j.cogdev.2009.03.004","DOI":"10.1016\/j.cogdev.2009.03.004"},{"key":"e_1_3_3_3_56_2","unstructured":"UW\u00a0Allen School Security and Privacy\u00a0Research Lab. [n. d.]. 2019 Industry-Academia Summit on Mixed Reality Security Privacy and Safety: Summit Report. https:\/\/ar-sec.cs.washington.edu\/research.html"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.13"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","unstructured":"Kiron Lebeck Kimberly Ruth Tadayoshi Kohno and Franziska Roesner. 2018. Arya: Operating system support for securely augmenting reality. IEEE Security & Privacy 16 1 (2018) 44\u201353. 10.1109\/MSP.2018.1331020 Publisher: IEEE.","DOI":"10.1109\/MSP.2018.1331020"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641991"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300917"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","unstructured":"Daniel Medeiros Romane Dubus Julie Williamson Graham Wilson Katharina P\u00f6hlmann and Mark McGill. 2023. Surveying the Social Comfort of Body Device and Environment-Based Augmented Reality Interactions in Confined Passenger Spaces Using Mixed Reality Composite Videos. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7 3 (2023) 113:1\u2013113:25. 10.1145\/3610923","DOI":"10.1145\/3610923"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711065"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581449"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25109-312"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","unstructured":"Shaylene\u00a0E. Nancekivell and Ori Friedman. 2014. Mine yours no one\u2019s: Children\u2019s understanding of how ownership affects object use. Developmental Psychology 50 7 (2014) 1845\u20131853. 10.1037\/a0036971 Place: US Publisher: American Psychological Association.","DOI":"10.1037\/a0036971"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-15"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078874"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Karen\u00a0R. Neary Ori Friedman and Corinna\u00a0L. Burnstein. 2009. Preschoolers infer ownership from \u201ccontrol of permission\u201d. Developmental Psychology 45 3 (2009) 873. https:\/\/psycnet.apa.org\/fulltext\/2009-05916-020.html Publisher: American Psychological Association.","DOI":"10.1037\/a0014088"},{"key":"e_1_3_3_3_69_2","first-page":"1","volume-title":"2015 International Conference on Information Systems Security and Privacy (ICISSP)","author":"Nergaard Henrik","year":"2015","unstructured":"Henrik Nergaard, Nils Ulltveit-Moe, and Terje Gj. 2015. A scratch-based graphical policy editor for XACML. In 2015 International Conference on Information Systems Security and Privacy (ICISSP). IEEE, 1\u20139. https:\/\/ieeexplore.ieee.org\/abstract\/document\/7509953"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9981149"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","unstructured":"Madison\u00a0L. Pesowski and Ori Friedman. 2015. Preschoolers and toddlers use ownership to predict basic emotions. Emotion 15 1 (2015) 104\u2013108. 10.1037\/emo0000027 Place: US Publisher: American Psychological Association.","DOI":"10.1037\/emo0000027"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","unstructured":"Madison\u00a0L. Pesowski and Lindsey\u00a0J. Powell. 2023. Ownership as privileged utility. Cognitive Development 66 (April 2023) 101321. 10.1016\/j.cogdev.2023.101321","DOI":"10.1016\/j.cogdev.2023.101321"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","unstructured":"Lev Poretski Ofer Arazy Joel Lanir and Oded Nov. 2021. Who owns what? Psychological ownership in shared augmented reality. International Journal of Human-Computer Studies 150 (2021) 102611. 10.1016\/j.ijhcs.2021.102611 Publisher: Elsevier.","DOI":"10.1016\/j.ijhcs.2021.102611"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581089"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606750"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641707"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906405"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357285"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979243"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"publisher","unstructured":"Franziska Roesner Tadayoshi Kohno and David Molnar. 2014. Security and privacy for augmented reality systems. Commun. ACM 57 4 (April 2014) 88\u201396. 10.1145\/2580723.2580730","DOI":"10.1145\/2580723.2580730"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660319"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"publisher","unstructured":"Federico Rossano Hannes Rakoczy and Michael Tomasello. 2011. Young children\u2019s understanding of violations of property rights. Cognition 121 2 (2011) 219\u2013227. 10.1016\/j.cognition.2011.06.007 Publisher: Elsevier.","DOI":"10.1016\/j.cognition.2011.06.007"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3325109"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3490149.3501320"},{"key":"e_1_3_3_3_85_2","volume-title":"Proceedings of the USENIX Security Symposium","author":"Ruth Kimberly","year":"2019","unstructured":"Kimberly Ruth, Tadayoshi Kohno, and Franziska Roesner. 2019. Secure multi-user content sharing for augmented reality applications. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","unstructured":"Philipp Schaper Anna Riedmann Sebastian Oberd\u00f6rfer Maileen Kr\u00e4he and Birgit Lugrin. 2022. Addressing Waste Separation With a Persuasive Augmented Reality App. Proc. ACM Hum.-Comput. Interact. 6 MHCI (Sept. 2022) 1\u201316. 10.1145\/3546740","DOI":"10.1145\/3546740"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","unstructured":"Jiacheng Shang Si Chen Jie Wu and Shu Yin. 2022. ARSpy: Breaking Location-Based Multi-Player Augmented Reality Application for User Location Tracking. IEEE Transactions on Mobile Computing 21 2 (Feb. 2022) 433\u2013447. 10.1109\/TMC.2020.3007740 Conference Name: IEEE Transactions on Mobile Computing.","DOI":"10.1109\/TMC.2020.3007740"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"publisher","unstructured":"Amit\u00a0Kumar Sikder Leonardo Babun Z.\u00a0Berkay Celik Hidayet Aksu Patrick McDaniel Engin Kirda and A.\u00a0Selcuk Uluagac. 2022. Who\u2019s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet Things 3 4 (2022) 27:1\u201327:39. 10.1145\/3543513","DOI":"10.1145\/3543513"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375740"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"publisher","unstructured":"Thad Starner Steve Mann Bradley Rhodes Jeffrey Levine Jennifer Healey Dana Kirsch Rosalind\u00a0W. Picard and Alex Pentland. 1997. Augmented Reality through Wearable Computing. Presence: Teleoperators & Virtual Environments 6 4 (Aug. 1997) 386\u2013398. 10.1162\/pres.1997.6.4.386","DOI":"10.1162\/pres.1997.6.4.386"},{"key":"e_1_3_3_3_91_2","unstructured":"Pranav Subramaniam and Sanjay Krishnan. 2024. Intent-Based Access Control: Using LLMs to Intelligently Manage Access Control. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.07332 (2024)."},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379337.3415892"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23014"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1007\/115512015"},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379337.3415815"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363191"},{"key":"e_1_3_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517689"},{"key":"e_1_3_3_3_98_2","first-page":"159","volume-title":"USENIX Security Symposium","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study.. In USENIX Security Symposium. 159\u2013176."},{"key":"e_1_3_3_3_99_2","unstructured":"Lyuye Zhang Kaixuan Li Kairan Sun Daoyuan Wu Ye Liu Haoye Tian and Yang Liu. 2024. Acfix: Guiding llms with mined common rbac practices for context-aware repair of access control vulnerabilities in smart contracts. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.06838 (2024)."},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"publisher","unstructured":"Mengya Zheng Xingyu Pan Nestor\u00a0Velasco Bermeo Rosemary\u00a0J. Thomas David Coyle Gregory\u00a0MP O\u2019hare and Abraham\u00a0G. Campbell. 2022. Stare: Augmented reality data visualization for explainable decision support in smart environments. IEEE Access 10 (2022) 29543\u201329557. 10.1109\/ACCESS.2022.3156697 Publisher: IEEE.","DOI":"10.1109\/ACCESS.2022.3156697"},{"key":"e_1_3_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376313"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '25"},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713656","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:01:52Z","timestamp":1751605312000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":100,"alternative-id":["10.1145\/3706598.3713656","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713656","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}