{"id":"https://openalex.org/W2077448915","doi":"https://doi.org/10.1145/2462410.2462413","title":"Heuristic safety analysis of access control models","display_name":"Heuristic safety analysis of access control models","publication_year":2013,"publication_date":"2013-06-05","ids":{"openalex":"https://openalex.org/W2077448915","doi":"https://doi.org/10.1145/2462410.2462413","mag":"2077448915"},"language":"en","primary_location":{"id":"doi:10.1145/2462410.2462413","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462413","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025996509","display_name":"Peter Amthor","orcid":"https://orcid.org/0000-0001-7711-4450"},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Peter Amthor","raw_affiliation_strings":["Ilmenau University of Technology, Ilmenau, Germany","Ilmenau University of Technology Ilmenau Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Ilmenau University of Technology, Ilmenau, Germany","institution_ids":["https://openalex.org/I119449181"]},{"raw_affiliation_string":"Ilmenau University of Technology Ilmenau Germany#TAB#","institution_ids":["https://openalex.org/I119449181"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038007506","display_name":"Winfried E. K\u00fchnhauser","orcid":null},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Winfried E. K\u00fchnhauser","raw_affiliation_strings":["Ilmenau University of Technology, Ilmenau, Germany","Ilmenau University of Technology Ilmenau Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Ilmenau University of Technology, Ilmenau, Germany","institution_ids":["https://openalex.org/I119449181"]},{"raw_affiliation_string":"Ilmenau University of Technology Ilmenau Germany#TAB#","institution_ids":["https://openalex.org/I119449181"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060240615","display_name":"Anja P\u00f6lck","orcid":null},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Anja P\u00f6lck","raw_affiliation_strings":["Ilmenau University of Technology, Ilmenau, Germany","Ilmenau University of Technology Ilmenau Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Ilmenau University of Technology, Ilmenau, Germany","institution_ids":["https://openalex.org/I119449181"]},{"raw_affiliation_string":"Ilmenau University of Technology Ilmenau Germany#TAB#","institution_ids":["https://openalex.org/I119449181"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025996509"],"corresponding_institution_ids":["https://openalex.org/I119449181"],"apc_list":null,"apc_paid":null,"fwci":3.9008,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.93992838,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"137","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7907480001449585},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.630169153213501},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6255863904953003},{"id":"https://openalex.org/keywords/generality","display_name":"Generality","score":0.6128515005111694},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5686923265457153},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.563237190246582},{"id":"https://openalex.org/keywords/decidability","display_name":"Decidability","score":0.5542110800743103},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4978604316711426},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4790017306804657},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4635343551635742},{"id":"https://openalex.org/keywords/modeling-language","display_name":"Modeling language","score":0.4151144027709961},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2453819215297699},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23567500710487366},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1897728443145752}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7907480001449585},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.630169153213501},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6255863904953003},{"id":"https://openalex.org/C2780767217","wikidata":"https://www.wikidata.org/wiki/Q5532421","display_name":"Generality","level":2,"score":0.6128515005111694},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5686923265457153},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.563237190246582},{"id":"https://openalex.org/C153269930","wikidata":"https://www.wikidata.org/wiki/Q430001","display_name":"Decidability","level":2,"score":0.5542110800743103},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4978604316711426},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4790017306804657},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4635343551635742},{"id":"https://openalex.org/C179603123","wikidata":"https://www.wikidata.org/wiki/Q1941921","display_name":"Modeling language","level":3,"score":0.4151144027709961},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2453819215297699},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23567500710487366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1897728443145752},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2462410.2462413","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462413","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W71622742","https://openalex.org/W1979579813","https://openalex.org/W1991895580","https://openalex.org/W1995511026","https://openalex.org/W1998568597","https://openalex.org/W2002597376","https://openalex.org/W2015653806","https://openalex.org/W2032131630","https://openalex.org/W2037008847","https://openalex.org/W2039589702","https://openalex.org/W2040234252","https://openalex.org/W2050411875","https://openalex.org/W2053741629","https://openalex.org/W2060690494","https://openalex.org/W2063727779","https://openalex.org/W2105614320","https://openalex.org/W2111753337","https://openalex.org/W2113448398","https://openalex.org/W2135432705","https://openalex.org/W2143492458","https://openalex.org/W2149153919","https://openalex.org/W2152053098","https://openalex.org/W2162022335","https://openalex.org/W2162171351","https://openalex.org/W2164661256","https://openalex.org/W2166602595","https://openalex.org/W2168538069","https://openalex.org/W2171934742","https://openalex.org/W2186960180","https://openalex.org/W4211218509"],"related_works":["https://openalex.org/W2045049461","https://openalex.org/W1978893398","https://openalex.org/W2201908702","https://openalex.org/W4381094582","https://openalex.org/W2369625323","https://openalex.org/W2364579609","https://openalex.org/W1977906818","https://openalex.org/W1522139108","https://openalex.org/W2353528968","https://openalex.org/W2406159297"],"abstract_inverted_index":{"Model-based":[0],"security":[1,5],"engineering":[2],"uses":[3],"formal":[4],"models":[6,38,51,118,137],"for":[7,67,110,141],"specifying":[8],"and":[9,34,36],"analyzing":[10,111],"access":[11,27,116,135,151],"control":[12,28,117,136,152],"systems.":[13,153],"Tool-based":[14],"model":[15],"analysis":[16,48,69],"encounters":[17],"a":[18,104,107],"fundamental":[19,140],"difficulty":[20],"here:":[21],"on":[22,129],"the":[23,45,79,83,90,112,126,130,143],"one":[24],"hand,":[25,47],"real-world":[26],"systems":[29],"generally":[30],"are":[31,139],"quite":[32],"large":[33],"complex":[35],"require":[37],"that":[39,95,138],"have":[40],"high":[41],"expressive":[42,80,121],"power.":[43,122],"On":[44],"other":[46],"of":[49,82,92,115,132,146],"such":[50],"is":[52,76],"often":[53],"pestered":[54],"by":[55],"computational":[56],"complexity":[57],"or":[58,149],"even":[59],"non-decidability,":[60],"making":[61],"it":[62],"difficult":[63],"to":[64,73,77,89],"devise":[65],"algorithms":[66],"automated":[68],"tools.":[70],"One":[71],"approach":[72],"this":[74,100],"problem":[75],"limiting":[78],"power":[81],"modeling":[84,142],"calculus,":[85],"resulting":[86],"in":[87],"restrictions":[88],"spectrum":[91],"application":[93],"scenarios":[94],"can":[96],"be":[97],"modeled.":[98],"In":[99],"paper":[101,127],"we":[102],"propose":[103],"different":[105],"approach:":[106],"heuristic-based":[108],"method":[109],"safety":[113],"properties":[114],"with":[119],"full":[120],"Aiming":[123],"at":[124],"generality,":[125],"focuses":[128],"lineage":[131],"HRU-style,":[133],"automaton-based":[134],"dynamic":[144],"behavior":[145],"contemporary":[147],"role-based":[148],"attribute-based":[150]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
