{"id":"https://openalex.org/W4242558719","doi":"https://doi.org/10.1145/1542207","title":"Proceedings of the 14th ACM symposium on Access control models and technologies","display_name":"Proceedings of the 14th ACM symposium on Access control models and technologies","publication_year":2009,"publication_date":"2009-06-03","ids":{"openalex":"https://openalex.org/W4242558719","doi":"https://doi.org/10.1145/1542207"},"language":"en","primary_location":{"id":"doi:10.1145/1542207","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1542207","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9239000082015991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6510580778121948},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5993397235870361},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.5511965155601501},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4925606846809387},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4721417725086212},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.45255720615386963},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4276919960975647},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4180026054382324},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.35124480724334717},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.322465181350708},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24814307689666748},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18518075346946716}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6510580778121948},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5993397235870361},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.5511965155601501},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4925606846809387},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4721417725086212},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.45255720615386963},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4276919960975647},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4180026054382324},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35124480724334717},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.322465181350708},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24814307689666748},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18518075346946716},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1542207","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1542207","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W1558850179","https://openalex.org/W2751996392","https://openalex.org/W1578529736","https://openalex.org/W2753718075","https://openalex.org/W2599028574","https://openalex.org/W4300507456","https://openalex.org/W4365518879","https://openalex.org/W2097717393","https://openalex.org/W3114910158"],"abstract_inverted_index":{"It":[0],"is":[1],"our":[2],"great":[3],"pleasure":[4],"to":[5,8],"welcome":[6],"you":[7],"the":[9,29,61,76,86,90,149,171],"14th":[10],"ACM":[11],"Symposium":[12],"on":[13,37,130,141,163],"Access":[14,133,143],"Control":[15],"Models":[16],"and":[17,48,112,115,120,123,136,139,146,165,187],"Technologies":[18],"(SACMAT":[19],"2009).":[20],"This":[21],"year's":[22],"symposium":[23],"continues":[24],"its":[25],"tradition":[26],"of":[27,34,41,102],"being":[28],"premier":[30],"forum":[31],"for":[32,52,89,118,167,184],"presentation":[33],"research":[35],"results":[36],"leading":[38],"edge":[39],"issues":[40],"access":[42,116],"control,":[43],"including":[44,104],"models,":[45],"systems,":[46],"applications,":[47],"theory.":[49],"The":[50,92,125],"call":[51],"papers":[53,97],"attracted":[54],"75":[55],"submissions":[56],"from":[57,158],"many":[58],"countries":[59],"around":[60],"world.":[62],"Each":[63],"submission":[64],"was":[65],"reviewed":[66],"by":[67,155],"at":[68],"least":[69],"three":[70],"reviewers":[71],"who":[72],"are":[73],"experts":[74],"in":[75,84,170],"field.":[77],"Furthermore,":[78],"extensive":[79],"online":[80],"discussions":[81],"took":[82],"place":[83],"making":[85],"final":[87],"selections":[88],"symposium.":[91],"program":[93,126,150],"committee":[94],"selected":[95],"24":[96],"that":[98,175],"cover":[99],"a":[100,128,152,181],"variety":[101],"topics,":[103],"role":[105],"engineering,":[106],"secure":[107],"information":[108],"sharing,":[109],"security":[110,185],"analysis":[111],"verification,":[113],"trust":[114],"control":[117],"systems":[119],"model":[121],"extensions":[122],"meta-models.":[124],"includes":[127,151],"panel":[129],"Usability":[131],"Meets":[132],"Control:":[134,144],"Challenges":[135,145,164],"Research":[137],"Opportunities":[138,166],"another":[140],"Spatio-Temporal":[142],"Applications.":[147],"Finally,":[148],"keynote":[153],"speech":[154],"Frank":[156],"Siebenlist":[157],"Argonne":[159],"National":[160],"Laboratory,":[161],"USA":[162],"Virtualized":[168],"Security":[169],"Clouds.":[172],"We":[173],"hope":[174],"these":[176],"proceedings":[177],"will":[178],"serve":[179],"as":[180],"valuable":[182],"reference":[183],"researchers":[186],"developers.":[188]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
