{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T20:10:06Z","timestamp":1755893406681,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1145\/3714393.3726520","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T18:38:47Z","timestamp":1749062327000},"page":"107-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["To the Best of Knowledge and Belief: On Eventually Consistent Access Control"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5739-8852","authenticated-orcid":false,"given":"Florian","family":"Jacob","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-3180","authenticated-orcid":false,"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3695249"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Paulo S\u00e9rgio Almeida. 2024b. A Framework for Consistency Models in Distributed Systems. doi:10.48550\/arXiv.2411.16355 arxiv: 2411.16355","DOI":"10.48550\/arXiv.2411.16355"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735508.2735509"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Davide Frey Lucie Guillou Michel Raynal and Franc cois Ta\u00efani. 2023. Process-Commutative Distributed Objects: From Cryptocurrencies to Byzantine-fault-tolerant CRDTs. doi:10.48550\/arXiv.2311.13936 arxiv: 2311.13936 [cs]","DOI":"10.48550\/arXiv.2311.13936"},{"key":"e_1_3_2_1_5_1","volume-title":"Keyhive: Local-first Access Control. https:\/\/www.inkandswitch.com\/keyhive\/","author":"Good Alex","year":"2025","unstructured":"Alex Good, John Mumm, and Brooklyn Zelenka. 2025. Keyhive: Local-first Access Control. https:\/\/www.inkandswitch.com\/keyhive\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Only the Limits of Our Imagination: An exclusive interview with RADM Grace M. Hopper. Chips Magazine (July","author":"Hamblen Diane","year":"1986","unstructured":"Diane Hamblen. 1986. Only the Limits of Our Imagination: An exclusive interview with RADM Grace M. Hopper. Chips Magazine (July 1986). https:\/\/web.archive.org\/web\/20090114165606\/http:\/\/www.chips.navy.mil\/archives\/86_jul\/interview.html"},{"key":"e_1_3_2_1_7_1","volume-title":"Ruzzo","author":"Harrison Michael A.","year":"1978","unstructured":"Michael A. Harrison and Walter L. Ruzzo. 1978. Monotonic Protection Systems. In Foundations of Secure Computation. Atlanta, Georgia, USA."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369736"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/114005.102808"},{"key":"e_1_3_2_1_10_1","unstructured":"Matthew Hodgson. 2023. Matrix 2.0. https:\/\/archive.fosdem.org\/2023\/schedule\/event\/matrix20\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395399"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058576"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3642976.3653034"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517209.3524042"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359591.3359737"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605438"},{"key":"e_1_3_2_1_17_1","unstructured":"Steve Loynes. 2024. UNICC Selects Element for Secure Communications. https:\/\/element.io\/blog\/unicc-selects-element-for-secure-communications\/"},{"volume-title":"Highly Available Storage with Minimal Trust. Ph.,D. Dissertation","author":"Mahajan Prince","key":"e_1_3_2_1_18_1","unstructured":"Prince Mahajan. 2012. Highly Available Storage with Minimal Trust. Ph.,D. Dissertation. University of Texas at Austin. http:\/\/hdl.handle.net\/2152\/16320"},{"key":"e_1_3_2_1_19_1","unstructured":"Garson O'Toole. 2018. It's Easier To Ask Forgiveness Than To Get Permission. https:\/\/quoteinvestigator.com\/2018\/06\/19\/forgive\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom60117.2023.00187"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--24550--3_29"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2904"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDIS.1994.331722"},{"key":"e_1_3_2_1_25_1","unstructured":"The Matrix.org Foundation CIC. 2024. Matrix v1.13. Specification. https:\/\/spec.matrix.org\/v1.13\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3217\/jucs-010-07-0751"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--46598--2_6"}],"event":{"name":"CODASPY '25: Fifteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Pittsburgh PA USA","acronym":"CODASPY '25"},"container-title":["Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726520","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3714393.3726520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:55:08Z","timestamp":1755892508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":28,"alternative-id":["10.1145\/3714393.3726520","10.1145\/3714393"],"URL":"https:\/\/doi.org\/10.1145\/3714393.3726520","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2025-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}