{"id":"https://openalex.org/W4390698517","doi":"https://doi.org/10.1007/978-3-031-51482-1_21","title":"Acumen: Analysing the\u00a0Impact of\u00a0Organisational Change on\u00a0Users\u2019 Access Entitlements","display_name":"Acumen: Analysing the\u00a0Impact of\u00a0Organisational Change on\u00a0Users\u2019 Access Entitlements","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4390698517","doi":"https://doi.org/10.1007/978-3-031-51482-1_21"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-51482-1_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-51482-1_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://researchoutput.csu.edu.au/en/publications/8ba00426-a639-403a-8a1d-19dda509ea1e","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047892435","display_name":"Selasi Kwashie","orcid":"https://orcid.org/0000-0003-4014-4976"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Selasi Kwashie","raw_affiliation_strings":["AI & Cyber Futures Institute, Charles Sturt University, Bathurst, Australia","CSIRO Data61, Adelaide, Australia","Cyber Security CRC, Joondalup, Australia"],"raw_orcid":"https://orcid.org/0000-0003-4014-4976","affiliations":[{"raw_affiliation_string":"AI & Cyber Futures Institute, Charles Sturt University, Bathurst, Australia","institution_ids":["https://openalex.org/I153230381"]},{"raw_affiliation_string":"CSIRO Data61, Adelaide, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Cyber Security CRC, Joondalup, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068307574","display_name":"Wei Kang","orcid":"https://orcid.org/0000-0003-0193-2654"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wei Kang","raw_affiliation_strings":["CSIRO Data61, Adelaide, Australia","Cyber Security CRC, Joondalup, Australia"],"raw_orcid":"https://orcid.org/0000-0003-0193-2654","affiliations":[{"raw_affiliation_string":"CSIRO Data61, Adelaide, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Cyber Security CRC, Joondalup, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035333829","display_name":"Sandeep Santhosh Kumar","orcid":"https://orcid.org/0000-0001-5957-6168"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sandeep Santhosh Kumar","raw_affiliation_strings":["CSIRO Data61, Adelaide, Australia"],"raw_orcid":"https://orcid.org/0000-0001-5957-6168","affiliations":[{"raw_affiliation_string":"CSIRO Data61, Adelaide, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061190890","display_name":"Geoff Jarrad","orcid":"https://orcid.org/0000-0001-8005-3097"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Geoff Jarrad","raw_affiliation_strings":["CSIRO Data61, Adelaide, Australia","Cyber Security CRC, Joondalup, Australia"],"raw_orcid":"https://orcid.org/0000-0001-8005-3097","affiliations":[{"raw_affiliation_string":"CSIRO Data61, Adelaide, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Cyber Security CRC, Joondalup, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084022157","display_name":"Seyit Camtepe","orcid":"https://orcid.org/0000-0001-6353-8359"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Seyit Camtepe","raw_affiliation_strings":["CSIRO Data61, Adelaide, Australia","Cyber Security CRC, Joondalup, Australia"],"raw_orcid":"https://orcid.org/0000-0001-6353-8359","affiliations":[{"raw_affiliation_string":"CSIRO Data61, Adelaide, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Cyber Security CRC, Joondalup, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["CSIRO Data61, Adelaide, Australia","Cyber Security CRC, Joondalup, Australia"],"raw_orcid":"https://orcid.org/0000-0002-3289-6599","affiliations":[{"raw_affiliation_string":"CSIRO Data61, Adelaide, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Cyber Security CRC, Joondalup, Australia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5047892435"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I153230381","https://openalex.org/I42894916"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00876764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"410","last_page":"430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.8197981119155884},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8049164414405823},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6648046970367432},{"id":"https://openalex.org/keywords/restructuring","display_name":"Restructuring","score":0.6166684627532959},{"id":"https://openalex.org/keywords/binary-decision-diagram","display_name":"Binary decision diagram","score":0.4549647271633148},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4469239413738251},{"id":"https://openalex.org/keywords/legacy-system","display_name":"Legacy system","score":0.43335655331611633},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.43196603655815125},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4252049922943115},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.416880339384079},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3591771125793457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2428312599658966},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.17425942420959473},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15966832637786865},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12636396288871765},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10181871056556702}],"concepts":[{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.8197981119155884},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8049164414405823},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6648046970367432},{"id":"https://openalex.org/C45237549","wikidata":"https://www.wikidata.org/wiki/Q1376796","display_name":"Restructuring","level":2,"score":0.6166684627532959},{"id":"https://openalex.org/C3309909","wikidata":"https://www.wikidata.org/wiki/Q864155","display_name":"Binary decision diagram","level":2,"score":0.4549647271633148},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4469239413738251},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.43335655331611633},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.43196603655815125},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4252049922943115},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.416880339384079},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3591771125793457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2428312599658966},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.17425942420959473},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15966832637786865},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12636396288871765},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10181871056556702},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-031-51482-1_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-51482-1_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:publications/8ba00426-a639-403a-8a1d-19dda509ea1e","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/8ba00426-a639-403a-8a1d-19dda509ea1e","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kwashie, S, Kang, W, Santhosh Kumar, S, Jarrad, G, Camtepe, S & Nepal, S 2024, Acumen : Analysing the\u00a0impact of\u00a0organisational change on\u00a0users\u2019 access entitlements. in G Tsudik, M Conti, K Liang & G Smaragdakis (eds), Computer Security \u2013 ESORICS 2023 : 28th European Symposium on Research in Computer Security. vol. 14347, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14347 LNCS, Springer, pp. 410-430, 28th European Symposium on Research in Computer Security, ESORICS 2023, The Hague, Netherlands, 25/09/23. https://doi.org/10.1007/978-3-031-51482-1_21","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/8ba00426-a639-403a-8a1d-19dda509ea1e","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/8ba00426-a639-403a-8a1d-19dda509ea1e","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kwashie, S, Kang, W, Santhosh Kumar, S, Jarrad, G, Camtepe, S & Nepal, S 2024, Acumen : Analysing the\u00a0impact of\u00a0organisational change on\u00a0users\u2019 access entitlements. in G Tsudik, M Conti, K Liang & G Smaragdakis (eds), Computer Security \u2013 ESORICS 2023 : 28th European Symposium on Research in Computer Security. vol. 14347, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14347 LNCS, Springer, pp. 410-430, 28th European Symposium on Research in Computer Security, ESORICS 2023, The Hague, Netherlands, 25/09/23. https://doi.org/10.1007/978-3-031-51482-1_21","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1481397690","https://openalex.org/W2011274796","https://openalex.org/W2060690494","https://openalex.org/W2128175578","https://openalex.org/W2129340874","https://openalex.org/W2133491672","https://openalex.org/W2133555576","https://openalex.org/W2135453964","https://openalex.org/W2140890531","https://openalex.org/W2143129186","https://openalex.org/W2146356111","https://openalex.org/W2153395142","https://openalex.org/W2164033917","https://openalex.org/W2295769861","https://openalex.org/W2534303543","https://openalex.org/W2804240010","https://openalex.org/W2912640545","https://openalex.org/W2914304911","https://openalex.org/W2962744771"],"related_works":["https://openalex.org/W2371841920","https://openalex.org/W2372156812","https://openalex.org/W2392187120","https://openalex.org/W2374393728","https://openalex.org/W2571946640","https://openalex.org/W2386545329","https://openalex.org/W2612447197","https://openalex.org/W2298912813","https://openalex.org/W2380490362","https://openalex.org/W2139115530"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
