{"id":"https://openalex.org/W3014685756","doi":"https://doi.org/10.1109/saner48275.2020.9054862","title":"Reflection on Building Hybrid Access Control by Configuring RBAC and MAC Features","display_name":"Reflection on Building Hybrid Access Control by Configuring RBAC and MAC Features","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3014685756","doi":"https://doi.org/10.1109/saner48275.2020.9054862","mag":"3014685756"},"language":"en","primary_location":{"id":"doi:10.1109/saner48275.2020.9054862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner48275.2020.9054862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008335284","display_name":"Dae\u2010Kyoo Kim","orcid":"https://orcid.org/0000-0002-7133-9111"},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dae-Kyoo Kim","raw_affiliation_strings":["Department of Computer Science and Engineering, Oakland University, Rochester, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Oakland University, Rochester, MI, USA","institution_ids":["https://openalex.org/I177721651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102765393","display_name":"Hua Ming","orcid":"https://orcid.org/0000-0001-5379-6311"},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hua Ming","raw_affiliation_strings":["Department of Computer Science and Engineering, Oakland University, Rochester, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Oakland University, Rochester, MI, USA","institution_ids":["https://openalex.org/I177721651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015062108","display_name":"Lunjin Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lunjin Lu","raw_affiliation_strings":["Department of Computer Science and Engineering, Oakland University, Rochester, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Oakland University, Rochester, MI, USA","institution_ids":["https://openalex.org/I177721651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008335284"],"corresponding_institution_ids":["https://openalex.org/I177721651"],"apc_list":null,"apc_paid":null,"fwci":0.3488,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70820281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.8941739797592163},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8892399072647095},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7291426658630371},{"id":"https://openalex.org/keywords/reflection","display_name":"Reflection (computer programming)","score":0.5923822522163391},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5655719637870789},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.5220130085945129},{"id":"https://openalex.org/keywords/information-access","display_name":"Information access","score":0.49297094345092773},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4299096465110779},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3364841341972351},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29581981897354126},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12674537301063538}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.8941739797592163},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8892399072647095},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7291426658630371},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.5923822522163391},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5655719637870789},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.5220130085945129},{"id":"https://openalex.org/C2776543384","wikidata":"https://www.wikidata.org/wiki/Q593289","display_name":"Information access","level":2,"score":0.49297094345092773},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4299096465110779},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3364841341972351},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29581981897354126},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12674537301063538},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saner48275.2020.9054862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner48275.2020.9054862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W153093637","https://openalex.org/W1486178352","https://openalex.org/W1524147119","https://openalex.org/W1533312470","https://openalex.org/W1533960910","https://openalex.org/W1541738285","https://openalex.org/W1559018605","https://openalex.org/W1594706025","https://openalex.org/W1919037857","https://openalex.org/W1969771171","https://openalex.org/W1997199359","https://openalex.org/W2002217674","https://openalex.org/W2007999111","https://openalex.org/W2047497632","https://openalex.org/W2061179786","https://openalex.org/W2099213660","https://openalex.org/W2105706607","https://openalex.org/W2120628527","https://openalex.org/W2131414609","https://openalex.org/W2154765153","https://openalex.org/W2294395356","https://openalex.org/W2766923866","https://openalex.org/W2768007184","https://openalex.org/W2791998849","https://openalex.org/W2907535280","https://openalex.org/W2915169358","https://openalex.org/W4245886278","https://openalex.org/W4255698817","https://openalex.org/W6629172888","https://openalex.org/W6631457488","https://openalex.org/W6696786625","https://openalex.org/W6748550034","https://openalex.org/W6759497623"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"This":[0],"paper":[1,5],"reflects":[2],"on":[3],"the":[4,68,74,83,92,96,99,113,116],"titled":[6],"Building":[7],"Hybrid":[8],"Access":[9,40,44],"Control":[10,41,45],"by":[11,46],"Configuring":[12],"RBAC":[13],"and":[14,22,42,48,78],"MAC":[15],"Features":[16],"which":[17,62],"was":[18],"published":[19],"in":[20,51,91],"Information":[21],"System":[23],"Technology,":[24],"2014.":[25],"The":[26,55],"publication":[27,56,75,117],"presents":[28],"an":[29,104],"approach":[30,110],"for":[31,82,107],"building":[32],"a":[33,108],"hybrid":[34],"access":[35],"control":[36],"model":[37],"of":[38,53,95,115],"Role-Based":[39],"Mandatory":[43],"defining":[47],"configuring":[49],"them":[50],"terms":[52],"features.":[54],"has":[57],"been":[58],"cited":[59,77],"three":[60],"times,":[61],"shows":[63],"limited":[64,84],"impact.":[65,85,120],"We":[66,86],"review":[67],"citing":[69],"papers":[70],"as":[71],"to":[72,111],"how":[73],"is":[76],"discuss":[79,88],"possible":[80],"reasons":[81],"also":[87],"its":[89],"position":[90],"current":[93],"state":[94],"arts":[97],"since":[98],"publication.":[100],"Then,":[101],"we":[102],"describe":[103],"ongoing":[105],"effort":[106],"new":[109],"address":[112],"weaknesses":[114],"with":[118],"expected":[119]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
