{"id":"https://openalex.org/W2103780649","doi":"https://doi.org/10.1145/1479064.1479168","title":"The formulary model for flexible privacy and access controls","display_name":"The formulary model for flexible privacy and access controls","publication_year":1971,"publication_date":"1971-01-01","ids":{"openalex":"https://openalex.org/W2103780649","doi":"https://doi.org/10.1145/1479064.1479168","mag":"2103780649"},"language":"en","primary_location":{"id":"doi:10.1145/1479064.1479168","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1479064.1479168","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1479064.1479168","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the May 16-18, 1972, spring joint computer conference on - AFIPS '72 (Spring)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/1479064.1479168","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014105565","display_name":"Lance J. Hoffman","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lance J. Hoffman","raw_affiliation_strings":["University of California, Berkeley, California"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, California","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014105565"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":15.5018,"has_fulltext":true,"cited_by_count":32,"citation_normalized_percentile":{"value":0.98715735,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"587","last_page":"587"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8196859359741211},{"id":"https://openalex.org/keywords/formulary","display_name":"Formulary","score":0.806849479675293},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6371026635169983},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.6166488528251648},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5866921544075012},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.5634548664093018},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.5061230063438416},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4331928789615631},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.4295310378074646},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.37454402446746826},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2638925611972809},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14117103815078735},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0853581428527832}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8196859359741211},{"id":"https://openalex.org/C100406419","wikidata":"https://www.wikidata.org/wiki/Q3543802","display_name":"Formulary","level":2,"score":0.806849479675293},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6371026635169983},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.6166488528251648},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5866921544075012},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.5634548664093018},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.5061230063438416},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4331928789615631},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.4295310378074646},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.37454402446746826},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2638925611972809},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14117103815078735},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0853581428527832},{"id":"https://openalex.org/C98274493","wikidata":"https://www.wikidata.org/wiki/Q128406","display_name":"Pharmacology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1479064.1479168","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1479064.1479168","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1479064.1479168","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the May 16-18, 1972, spring joint computer conference on - AFIPS '72 (Spring)","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/1479064.1479168","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1479064.1479168","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1479064.1479168","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the May 16-18, 1972, spring joint computer conference on - AFIPS '72 (Spring)","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2103780649.pdf","grobid_xml":"https://content.openalex.org/works/W2103780649.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W159819043","https://openalex.org/W1480724856","https://openalex.org/W1997478264","https://openalex.org/W2010635269","https://openalex.org/W2024419015","https://openalex.org/W2032695662","https://openalex.org/W2041807141","https://openalex.org/W2047623502","https://openalex.org/W2057621522","https://openalex.org/W2066910307","https://openalex.org/W2094826370","https://openalex.org/W2104508180","https://openalex.org/W2109394932","https://openalex.org/W2113350481","https://openalex.org/W2134138865","https://openalex.org/W2145328936","https://openalex.org/W2162041048","https://openalex.org/W2165986112","https://openalex.org/W2179246790"],"related_works":["https://openalex.org/W1495119096","https://openalex.org/W2284242097","https://openalex.org/W2277948094","https://openalex.org/W2086058948","https://openalex.org/W2357522001","https://openalex.org/W2045901755","https://openalex.org/W2546066963","https://openalex.org/W2121067221","https://openalex.org/W1653371073","https://openalex.org/W2062599910"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,61],"model":[4,26],"for":[5,10],"engineering":[6],"the":[7,86,94],"user":[8,62],"interface":[9],"large":[11],"data":[12,33,68,92,95],"base":[13,34],"systems":[14],"in":[15,93],"order":[16],"to":[17,40],"maintain":[18],"flexible":[19],"access":[20,45],"controls":[21],"over":[22],"sensitive":[23],"data.":[24],"The":[25,57],"is":[27,37,49,69],"independent":[28,84],"of":[29,53,78,85,90],"both":[30],"machine":[31],"and":[32,36],"structure,":[35],"sufficiently":[38],"modular":[39],"allow":[41],"cost-effectiveness":[42],"studies":[43],"on":[44,51,59],"mechanisms.":[46],"Access":[47],"control":[48],"based":[50],"sets":[52],"procedures":[54],"called":[55],"formularies.":[56],"decision":[58],"whether":[60],"can":[63,81],"read,":[64],"write,":[65],"update,":[66],"etc.,":[67],"controlled":[70],"by":[71],"programs":[72],"(not":[73],"merely":[74],"bits":[75],"or":[76,88],"tables":[77],"data)":[79],"which":[80],"be":[82],"completely":[83],"contents":[87],"location":[89],"raw":[91],"base.":[96]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
