{"id":"https://openalex.org/W2124228505","doi":"https://doi.org/10.1145/1029133.1029140","title":"A logic-based framework for attribute based access control","display_name":"A logic-based framework for attribute based access control","publication_year":2004,"publication_date":"2004-10-29","ids":{"openalex":"https://openalex.org/W2124228505","doi":"https://doi.org/10.1145/1029133.1029140","mag":"2124228505"},"language":"en","primary_location":{"id":"doi:10.1145/1029133.1029140","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029133.1029140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2004 ACM workshop on Formal methods in security engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100730397","display_name":"Lingyu Wang","orcid":"https://orcid.org/0000-0002-7441-7541"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lingyu Wang","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071866219","display_name":"Duminda Wijesekera","orcid":"https://orcid.org/0000-0002-7122-3055"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Duminda Wijesekera","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100730397"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":41.7681,"has_fulltext":false,"cited_by_count":264,"citation_normalized_percentile":{"value":0.99749008,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.671579122543335},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48044607043266296},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33431583642959595},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12254717946052551}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.671579122543335},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48044607043266296},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33431583642959595},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12254717946052551}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1029133.1029140","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029133.1029140","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2004 ACM workshop on Formal methods in security engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.585.7927","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.585.7927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://users.encs.concordia.ca/~wang/papers/fmse04.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.86.51","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.51","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://csis.gmu.edu/faculty/jajodia-fmse-2004.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W16194962","https://openalex.org/W165540643","https://openalex.org/W1543461272","https://openalex.org/W1598566063","https://openalex.org/W1657826747","https://openalex.org/W1934625249","https://openalex.org/W1968556863","https://openalex.org/W1978413491","https://openalex.org/W1993163335","https://openalex.org/W1995626385","https://openalex.org/W2003531456","https://openalex.org/W2010104109","https://openalex.org/W2012419258","https://openalex.org/W2023299380","https://openalex.org/W2023572265","https://openalex.org/W2027319813","https://openalex.org/W2027993053","https://openalex.org/W2029740449","https://openalex.org/W2036481185","https://openalex.org/W2041608581","https://openalex.org/W2043140417","https://openalex.org/W2045895261","https://openalex.org/W2077298707","https://openalex.org/W2077494135","https://openalex.org/W2098662896","https://openalex.org/W2099792091","https://openalex.org/W2123396057","https://openalex.org/W2123479684","https://openalex.org/W2124266137","https://openalex.org/W2138706506","https://openalex.org/W2156969606","https://openalex.org/W2166602595","https://openalex.org/W3104144878","https://openalex.org/W4234835746","https://openalex.org/W6600628903","https://openalex.org/W6678569237"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Attribute":[0],"based":[1,9],"access":[2,24,46,116],"control":[3,25,47,117],"(ABAC)":[4],"grants":[5],"accesses":[6],"to":[7,91,164],"services":[8,43],"on":[10,95],"the":[11,15,21,29,37,45,58,147],"attributes":[12,35],"possessed":[13],"by":[14,27,31,39,64,71],"requester.":[16],"Thus,":[17],"ABAC":[18,159],"differs":[19],"from":[20],"traditional":[22],"discretionary":[23],"model":[26],"replacing":[28],"subject":[30],"a":[32,40,109,125],"set":[33,41,122,127],"of":[34,42,104,115,124,146],"and":[36,156],"object":[38],"in":[44,53],"matrix.":[48],"The":[49,80,144],"former":[50],"is":[51,82],"appropriate":[52,83],"an":[54],"identity-less":[55],"system":[56],"like":[57],"Internet":[59,86],"where":[60],"subjects":[61],"are":[62,88,154],"identified":[63],"their":[65],"characteristics,":[66],"such":[67],"as":[68,77,102,134],"those":[69],"substantiated":[70],"certificates.":[72],"These":[73,98],"can":[74,99,161],"be":[75,100,162],"modeled":[76,101],"attribute":[78],"sets.":[79],"latter":[81],"because":[84],"most":[85],"users":[87],"not":[89],"privy":[90],"method":[92],"names":[93],"residing":[94],"remote":[96],"servers.":[97],"sets":[103],"service":[105],"options.":[106],"We":[107],"present":[108],"framework":[110,131,150],"that":[111,140,152],"models":[112],"this":[113],"aspect":[114],"using":[118],"logic":[119,138],"programming":[120],"with":[121],"constraints":[123],"computable":[126],"theory":[128],"[DPPR00].":[129],"Our":[130,158],"specifies":[132],"policies":[133,160],"stratified":[135],"constraint":[136],"flounder-free":[137],"programs":[139],"admit":[141],"primitive":[142],"recursion.":[143],"design":[145],"policy":[148],"specification":[149],"ensures":[151],"they":[153],"consistent":[155],"complete.":[157],"transformed":[163],"ensure":[165],"faster":[166],"runtimes.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":17},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":20},{"year":2015,"cited_by_count":14},{"year":2014,"cited_by_count":16},{"year":2013,"cited_by_count":23},{"year":2012,"cited_by_count":23}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
