{"id":"https://openalex.org/W2138916465","doi":"https://doi.org/10.1109/policy.2004.1309162","title":"Cassandra: distributed access control policies with tunable expressiveness","display_name":"Cassandra: distributed access control policies with tunable expressiveness","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2138916465","doi":"https://doi.org/10.1109/policy.2004.1309162","mag":"2138916465"},"language":"en","primary_location":{"id":"doi:10.1109/policy.2004.1309162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/policy.2004.1309162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049870116","display_name":"M.Y. Becker","orcid":"https://orcid.org/0009-0006-8296-7865"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"M.Y. Becker","raw_affiliation_strings":["Computer Laboratory, University of Cambridge, Cambridge, UK","Cambridge Univ., , UK"],"affiliations":[{"raw_affiliation_string":"Computer Laboratory, University of Cambridge, Cambridge, UK","institution_ids":["https://openalex.org/I241749"]},{"raw_affiliation_string":"Cambridge Univ., , UK","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083405043","display_name":"Peter Sewell","orcid":"https://orcid.org/0000-0001-9352-1013"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"P. Sewell","raw_affiliation_strings":["Computer Laboratory, University of Cambridge, Cambridge, UK","Cambridge Univ., , UK"],"affiliations":[{"raw_affiliation_string":"Computer Laboratory, University of Cambridge, Cambridge, UK","institution_ids":["https://openalex.org/I241749"]},{"raw_affiliation_string":"Cambridge Univ., , UK","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049870116"],"corresponding_institution_ids":["https://openalex.org/I241749"],"apc_list":null,"apc_paid":null,"fwci":63.5501,"has_fulltext":false,"cited_by_count":191,"citation_normalized_percentile":{"value":0.9989463,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"5","issue":null,"first_page":"159","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8693224787712097},{"id":"https://openalex.org/keywords/datalog","display_name":"Datalog","score":0.6188406944274902},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6170439720153809},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.575782060623169},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5577321648597717},{"id":"https://openalex.org/keywords/specification-language","display_name":"Specification language","score":0.5462529063224792},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.5000073909759521},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.495959609746933},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.48309874534606934},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.48082101345062256},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.48041486740112305},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4755132794380188},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.46930956840515137},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4211721420288086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30541038513183594},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.2287573218345642},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1601448953151703}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8693224787712097},{"id":"https://openalex.org/C148230440","wikidata":"https://www.wikidata.org/wiki/Q1172264","display_name":"Datalog","level":2,"score":0.6188406944274902},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6170439720153809},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.575782060623169},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5577321648597717},{"id":"https://openalex.org/C201677973","wikidata":"https://www.wikidata.org/wiki/Q1209840","display_name":"Specification language","level":2,"score":0.5462529063224792},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.5000073909759521},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.495959609746933},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.48309874534606934},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.48082101345062256},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.48041486740112305},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4755132794380188},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.46930956840515137},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4211721420288086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30541038513183594},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2287573218345642},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1601448953151703},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/policy.2004.1309162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/policy.2004.1309162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.64.6693","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.6693","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cl.cam.ac.uk/~pes20/policy-policy04.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320006","display_name":"Royal Society","ror":"https://ror.org/03wnrjx87"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1532667386","https://openalex.org/W1555173530","https://openalex.org/W1602828133","https://openalex.org/W1749560176","https://openalex.org/W1847909677","https://openalex.org/W1859131989","https://openalex.org/W1998410860","https://openalex.org/W2000952251","https://openalex.org/W2006705008","https://openalex.org/W2015432046","https://openalex.org/W2023572265","https://openalex.org/W2063727779","https://openalex.org/W2077298707","https://openalex.org/W2089934546","https://openalex.org/W2102577841","https://openalex.org/W2123479684","https://openalex.org/W2124260419","https://openalex.org/W2130103312","https://openalex.org/W2150847510","https://openalex.org/W2154765153","https://openalex.org/W2168884369","https://openalex.org/W2170496240","https://openalex.org/W3032924572","https://openalex.org/W4231515497","https://openalex.org/W4248223175","https://openalex.org/W4285719527","https://openalex.org/W6654326349","https://openalex.org/W6675446150","https://openalex.org/W6678569237","https://openalex.org/W6684804314"],"related_works":["https://openalex.org/W2955734379","https://openalex.org/W1565271071","https://openalex.org/W1974407003","https://openalex.org/W149093214","https://openalex.org/W2082035886","https://openalex.org/W2407379720","https://openalex.org/W2143559337","https://openalex.org/W2977247807","https://openalex.org/W54995351","https://openalex.org/W2968495338"],"abstract_inverted_index":{"We":[0,72,155],"study":[1],"the":[2,66,99,150],"specification":[3,39,86],"of":[4,49,98,122,130],"access":[5,151],"control":[6,152],"policy":[7,21,38,85,160],"in":[8,31,33,59,68],"large-scale":[9],"distributed":[10,159],"systems.":[11],"Our":[12],"work":[13],"on":[14,89],"real-world":[15],"policies":[16,123],"has":[17,141],"shown":[18],"that":[19,163],"standard":[20],"idioms":[22],"such":[23],"as":[24,56,64],"role":[25,28,125,127],"hierarchy":[26],"or":[27],"delegation":[29],"occur":[30],"practice":[32],"many":[34,69],"subtle":[35],"variants.":[36],"A":[37],"language":[40,87,100],"should":[41],"therefore":[42],"be":[43,102],"able":[44],"to":[45],"express":[46,118],"this":[47],"variety":[48],"features":[50,58],"smoothly,":[51],"rather":[52],"than":[53],"add":[54],"them":[55],"specific":[57],"an":[60,81,106],"ad":[61],"hoc":[62],"way,":[63],"is":[65,164],"case":[67],"existing":[70],"languages.":[71],"present":[73],"Cassandra,":[74],"a":[75,119,142,157],"role-based":[76],"trust":[77,138],"management":[78],"system":[79],"with":[80,91],"elegant":[82],"and":[83,137,148,166],"readable":[84],"based":[88],"Datalog":[90],"constraints.":[92],"The":[93],"expressiveness":[94],"(and":[95],"computational":[96],"complexity)":[97],"can":[101,116],"adjusted":[103],"by":[104],"choosing":[105],"appropriate":[107],"constraint":[108],"domain.":[109],"With":[110],"just":[111],"five":[112],"special":[113],"predicates,":[114],"we":[115],"easily":[117],"wide":[120],"range":[121],"including":[124],"hierarchy,":[126],"delegation,":[128],"separation":[129],"duties,":[131],"cascading":[132],"revocation,":[133],"automatic":[134],"credential":[135],"discovery":[136],"negotiation.":[139],"Cassandra":[140],"formal":[143],"semantics":[144],"for":[145,149,172],"query":[146],"evaluation":[147,161],"enforcement":[153],"engine.":[154],"use":[156],"goal-oriented":[158],"algorithm":[162],"efficient":[165],"guarantees":[167],"termination.":[168],"Initial":[169],"performance":[170],"results":[171],"our":[173],"prototype":[174],"implementation":[175],"have":[176],"been":[177],"promising.":[178]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
