{"id":"https://openalex.org/W1965760444","doi":"https://doi.org/10.1016/0167-4048(92)90221-c","title":"A protection model incorporating both authorization and constraints","display_name":"A protection model incorporating both authorization and constraints","publication_year":1992,"publication_date":"1992-03-01","ids":{"openalex":"https://openalex.org/W1965760444","doi":"https://doi.org/10.1016/0167-4048(92)90221-c","mag":"1965760444"},"language":"en","primary_location":{"id":"doi:10.1016/0167-4048(92)90221-c","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(92)90221-c","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049640795","display_name":"Atika Laribi","orcid":null},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Atika Laribi","raw_affiliation_strings":["Faculty of Information Sciences and Engineering, University of Canberra, PO Box 1, Belconnen, ACT 2616, Australia","Faculty of Information Sciences and Engineering, University of Canberra, PO Box 1, Belconnen, ACT 2616, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Sciences and Engineering, University of Canberra, PO Box 1, Belconnen, ACT 2616, Australia","institution_ids":["https://openalex.org/I188329596"]},{"raw_affiliation_string":"Faculty of Information Sciences and Engineering, University of Canberra, PO Box 1, Belconnen, ACT 2616, Australia#TAB#","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020453711","display_name":"Dennis Kafura","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dennis Kafura","raw_affiliation_strings":["Department of Computer Science, Virginia Tech, Blacksburg, VA 24061, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Virginia Tech, Blacksburg, VA 24061, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049640795"],"corresponding_institution_ids":["https://openalex.org/I188329596"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14982181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"1","first_page":"57","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7984201908111572},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6225751638412476},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5991578698158264},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5915437340736389},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5374968647956848},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5267911553382874},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5186823606491089},{"id":"https://openalex.org/keywords/decidability","display_name":"Decidability","score":0.47861307859420776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4370192289352417},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.41472524404525757},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33060288429260254},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.20907026529312134}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7984201908111572},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6225751638412476},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5991578698158264},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5915437340736389},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5374968647956848},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5267911553382874},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5186823606491089},{"id":"https://openalex.org/C153269930","wikidata":"https://www.wikidata.org/wiki/Q430001","display_name":"Decidability","level":2,"score":0.47861307859420776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4370192289352417},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.41472524404525757},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33060288429260254},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.20907026529312134},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/0167-4048(92)90221-c","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(92)90221-c","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},{"id":"pmh:oai:vtcstechreports.OAI2:2","is_oa":false,"landing_page_url":"http://eprints.cs.vt.edu/archive/00000002/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400253","display_name":"Computer Science Technical Reports (Virginia Tech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I859038795","host_organization_name":"Virginia Tech","host_organization_lineage":["https://openalex.org/I859038795"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Departmental Technical Report"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1495473175","https://openalex.org/W1882297107","https://openalex.org/W1979579813","https://openalex.org/W1991895580","https://openalex.org/W2028093895","https://openalex.org/W2032248369","https://openalex.org/W2053741629","https://openalex.org/W2101191741","https://openalex.org/W2103780649","https://openalex.org/W2119948730","https://openalex.org/W2168098409","https://openalex.org/W2462435137","https://openalex.org/W2615507399","https://openalex.org/W3167011080","https://openalex.org/W4211218509","https://openalex.org/W6629570533","https://openalex.org/W6675283840","https://openalex.org/W6719311582","https://openalex.org/W6738258979","https://openalex.org/W6796176818","https://openalex.org/W6808419535"],"related_works":["https://openalex.org/W2123296434","https://openalex.org/W2555738791","https://openalex.org/W4298042445","https://openalex.org/W2104547074","https://openalex.org/W2132693790","https://openalex.org/W2017675414","https://openalex.org/W1593822213","https://openalex.org/W2095975812","https://openalex.org/W2367441718","https://openalex.org/W2017616439"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
