{"id":"https://openalex.org/W2767748837","doi":"https://doi.org/10.1109/tifs.2017.2771492","title":"Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control","display_name":"Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control","publication_year":2017,"publication_date":"2017-11-08","ids":{"openalex":"https://openalex.org/W2767748837","doi":"https://doi.org/10.1109/tifs.2017.2771492","mag":"2767748837"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2771492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2771492","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112241694","display_name":"Sadhana Jha","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sadhana Jha","raw_affiliation_strings":["Advanced Technology Development Centre, IIT Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Advanced Technology Development Centre, IIT Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036571304","display_name":"Shamik Sural","orcid":"https://orcid.org/0000-0002-4315-7329"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shamik Sural","raw_affiliation_strings":["Department of Computer Science and Engineering, IIT Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, IIT Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084845728","display_name":"Vijayalakshmi Atluri","orcid":"https://orcid.org/0000-0003-2068-780X"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijayalakshmi Atluri","raw_affiliation_strings":["MSIS Department, Rutgers University, New Brunswick, NJ, USA"],"affiliations":[{"raw_affiliation_string":"MSIS Department, Rutgers University, New Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034878799","display_name":"Jaideep Vaidya","orcid":"https://orcid.org/0000-0002-7420-6947"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jaideep Vaidya","raw_affiliation_strings":["MSIS Department, Rutgers University, New Brunswick, NJ, USA"],"affiliations":[{"raw_affiliation_string":"MSIS Department, Rutgers University, New Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112241694"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":11.4069,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.98047288,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"13","issue":"4","first_page":"897","last_page":"911"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/separation-of-duties","display_name":"Separation of duties","score":0.8638029098510742},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8251527547836304},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.7804213762283325},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.7491447329521179},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7304818034172058},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4525541365146637},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4284361004829407},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.3869747221469879},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30352896451950073}],"concepts":[{"id":"https://openalex.org/C100587491","wikidata":"https://www.wikidata.org/wiki/Q1474665","display_name":"Separation of duties","level":4,"score":0.8638029098510742},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8251527547836304},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.7804213762283325},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.7491447329521179},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7304818034172058},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4525541365146637},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4284361004829407},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.3869747221469879},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30352896451950073},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2017.2771492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2771492","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:alma.01RUT_INST:11663585710004646","is_oa":false,"landing_page_url":"https://scholarship.libraries.rutgers.edu/esploro/outputs/journalArticle/Specification-and-Verification-of-Separation-of/991031654944404646","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1015545679","https://openalex.org/W1037096493","https://openalex.org/W1487675067","https://openalex.org/W1493071618","https://openalex.org/W1920330819","https://openalex.org/W2002217674","https://openalex.org/W2008138206","https://openalex.org/W2015653806","https://openalex.org/W2024904820","https://openalex.org/W2031606427","https://openalex.org/W2053741629","https://openalex.org/W2065288470","https://openalex.org/W2091345559","https://openalex.org/W2097171586","https://openalex.org/W2108637261","https://openalex.org/W2110076463","https://openalex.org/W2111301415","https://openalex.org/W2143492458","https://openalex.org/W2152053098","https://openalex.org/W2152505375","https://openalex.org/W2166602595","https://openalex.org/W2296076762","https://openalex.org/W2296162648","https://openalex.org/W2298912813","https://openalex.org/W2324479125","https://openalex.org/W2398967959","https://openalex.org/W2431400374","https://openalex.org/W2540441229","https://openalex.org/W2567805712","https://openalex.org/W2749040653","https://openalex.org/W2751376120","https://openalex.org/W2752573522","https://openalex.org/W2962744771","https://openalex.org/W3145128584","https://openalex.org/W4213257303","https://openalex.org/W6626620944","https://openalex.org/W6652470279","https://openalex.org/W6676297544","https://openalex.org/W6718133289"],"related_works":["https://openalex.org/W2361825345","https://openalex.org/W2945232779","https://openalex.org/W1989989997","https://openalex.org/W2145228191","https://openalex.org/W2162379794","https://openalex.org/W293625591","https://openalex.org/W2039071067","https://openalex.org/W2767748837","https://openalex.org/W2134601432","https://openalex.org/W2383445287"],"abstract_inverted_index":{"Constraints":[0],"form":[1],"an":[2],"important":[3,59],"aspect":[4],"of":[5,16,43,46,49,70,87,93,102,118],"any":[6],"access":[7,23,78],"control":[8,24,79],"system":[9],"and":[10,37,74,106],"are":[11,34],"often":[12],"regarded":[13],"as":[14],"one":[15],"the":[17,40,47,57,68,85,90,100,103],"principle":[18],"motivations":[19],"behind":[20],"developing":[21],"different":[22,91],"models.":[25],"The":[26],"two":[27],"primary":[28],"concerns":[29],"related":[30],"to":[31,55],"a":[32,108,115],"constraint":[33,52],"its":[35],"specification":[36],"enforcement.":[38,96],"Among":[39],"various":[41],"types":[42],"constraints,":[44],"enforcement":[45,75,104],"Separation":[48],"Duty":[50],"(SoD)":[51],"is":[53],"considered":[54],"be":[56],"most":[58],"in":[60,76,89],"commercial":[61],"applications.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66],"introduce":[67],"problem":[69,105],"SoD":[71],"specification,":[72],"verification,":[73],"attribute-based":[77],"(ABAC)":[80],"systems.":[81],"We":[82,97],"then":[83],"demonstrate":[84],"effect":[86],"modifications":[88],"components":[92],"ABAC":[94],"on":[95,114],"also":[98],"analyze":[99],"complexity":[101],"provide":[107],"methodology":[109],"for":[110],"solving":[111],"it.":[112],"Experiments":[113],"wide":[116],"range":[117],"data":[119],"sets":[120],"show":[121],"encouraging":[122],"results.":[123]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
