{"id":"https://openalex.org/W1528417024","doi":"https://doi.org/10.1007/978-3-642-13739-6_20","title":"Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems","display_name":"Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1528417024","doi":"https://doi.org/10.1007/978-3-642-13739-6_20","mag":"1528417024"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-13739-6_20","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13739-6_20","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13739-6_20.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13739-6_20.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072339444","display_name":"Hasan N. Qunoo","orcid":null},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Hasan Qunoo","raw_affiliation_strings":["School of Computer Science, University of Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055690957","display_name":"Mark Ryan","orcid":"https://orcid.org/0000-0002-1632-497X"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mark Ryan","raw_affiliation_strings":["School of Computer Science, University of Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072339444"],"corresponding_institution_ids":["https://openalex.org/I79619799"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":15.4113,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.98840259,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"295","last_page":"302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8876819610595703},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5027656555175781},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.40830880403518677},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38121238350868225},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19634869694709778}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8876819610595703},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5027656555175781},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.40830880403518677},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38121238350868225},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19634869694709778}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-642-13739-6_20","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13739-6_20","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13739-6_20.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.185.4489","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.4489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.bham.ac.uk/%7Emdr/research/papers/pdf/10-dyn-acl.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-01056680v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01056680","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.295-302, &#x27E8;10.1007/978-3-642-13739-6_20&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/323dbe43-36b0-4978-8293-9598886e4ee3","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/323dbe43-36b0-4978-8293-9598886e4ee3","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Qunoo, H, Ryan, M, Foresti, S & Jajodia, S 2010, 'Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems', pp. 295-302. https://doi.org/10.1007/978-3-642-13739-6_20","raw_type":"conferenceObject"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-13739-6_20","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13739-6_20","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13739-6_20.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1528417024.pdf","grobid_xml":"https://content.openalex.org/works/W1528417024.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W192368243","https://openalex.org/W1528417024","https://openalex.org/W1559861367","https://openalex.org/W1602828133","https://openalex.org/W1733247015","https://openalex.org/W1749560176","https://openalex.org/W1790717150","https://openalex.org/W1856491113","https://openalex.org/W1996347293","https://openalex.org/W2020992910","https://openalex.org/W2083255124","https://openalex.org/W2108120132","https://openalex.org/W2112283625","https://openalex.org/W2113443649","https://openalex.org/W2123479684","https://openalex.org/W2138916465","https://openalex.org/W2146356111","https://openalex.org/W2150847510","https://openalex.org/W2169348910","https://openalex.org/W2498106352","https://openalex.org/W3141637363"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"We":[0,84,98],"present":[1],"a":[2,41],"modelling":[3],"language,":[4],"called":[5],"X":[6,35,57,87],"-Policy,":[7],"for":[8],"web-based":[9],"collaborative":[10,94],"systems":[11,23,39],"with":[12],"dynamic":[13],"access":[14,18,71],"control":[15],"policies.":[16],"The":[17,34,56],"to":[19,62,92],"resources":[20],"in":[21],"these":[22],"depends":[24],"on":[25,66,76,112],"the":[26,29,100],"state":[27],"of":[28,43],"system":[30,49,104],"and":[31,81,105],"its":[32],"configuration.":[33],"-Policy":[36,58,88],"language":[37,59],"models":[38],"as":[40],"set":[42],"actions.":[44],"These":[45],"actions":[46],"can":[47,74],"model":[48,93,99],"operations":[50],"which":[51,73],"are":[52],"executed":[53],"by":[54],"users.":[55],"allows":[60],"us":[61],"specify":[63],"execution":[64],"permissions":[65],"each":[67],"action":[68],"using":[69],"complex":[70],"conditions":[72],"depend":[75],"data":[77],"values,":[78],"other":[79],"permissions,":[80],"agent":[82],"roles.":[83],"demonstrate":[85],"that":[86],"is":[89],"expressive":[90],"enough":[91],"conference":[95,102],"management":[96,103],"systems.":[97],"EasyChair":[101],"we":[106],"reason":[107],"about":[108],"three":[109],"security":[110],"attacks":[111],"EasyChair.":[113]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
