{"id":"https://openalex.org/W2035254501","doi":"https://doi.org/10.1145/2462410.2462424","title":"HyXAC","display_name":"HyXAC","publication_year":2013,"publication_date":"2013-06-05","ids":{"openalex":"https://openalex.org/W2035254501","doi":"https://doi.org/10.1145/2462410.2462424","mag":"2035254501"},"language":"en","primary_location":{"id":"doi:10.1145/2462410.2462424","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462424","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001006558","display_name":"Manogna Thimma","orcid":null},"institutions":[{"id":"https://openalex.org/I179525631","display_name":"Cerner (United States)","ror":"https://ror.org/012c7gx93","country_code":"US","type":"company","lineage":["https://openalex.org/I179525631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Manogna Thimma","raw_affiliation_strings":["Cerner Corporation, Kansas City, MO, USA"],"affiliations":[{"raw_affiliation_string":"Cerner Corporation, Kansas City, MO, USA","institution_ids":["https://openalex.org/I179525631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021110628","display_name":"Tsam Kai Tsui","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tsam Kai Tsui","raw_affiliation_strings":["NIPR, Kansas City, MO, USA"],"affiliations":[{"raw_affiliation_string":"NIPR, Kansas City, MO, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052233895","display_name":"Bo Luo","orcid":"https://orcid.org/0000-0001-8196-2436"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Luo","raw_affiliation_strings":["University of Kansas, Lawrence, KS, USA"],"affiliations":[{"raw_affiliation_string":"University of Kansas, Lawrence, KS, USA","institution_ids":["https://openalex.org/I146416000"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001006558"],"corresponding_institution_ids":["https://openalex.org/I179525631"],"apc_list":null,"apc_paid":null,"fwci":5.851,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.95659959,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8955466747283936},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.592729926109314},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.531863808631897},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4767257273197174},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4589669704437256},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4544941484928131},{"id":"https://openalex.org/keywords/xpath","display_name":"XPath","score":0.4213041663169861},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.38646718859672546},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.34958046674728394},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3420292139053345},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2716730535030365},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18954262137413025},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08990275859832764}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8955466747283936},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.592729926109314},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.531863808631897},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4767257273197174},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4589669704437256},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4544941484928131},{"id":"https://openalex.org/C2780213375","wikidata":"https://www.wikidata.org/wiki/Q16340","display_name":"XPath","level":4,"score":0.4213041663169861},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.38646718859672546},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.34958046674728394},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3420292139053345},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2716730535030365},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18954262137413025},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08990275859832764}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2462410.2462424","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462410.2462424","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337378","display_name":"Office of Integrative Activities","ror":"https://ror.org/04k9mqs78"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W270849871","https://openalex.org/W1524700731","https://openalex.org/W1526954755","https://openalex.org/W1538487881","https://openalex.org/W1547831574","https://openalex.org/W1579500130","https://openalex.org/W1586903790","https://openalex.org/W1749179515","https://openalex.org/W1937082285","https://openalex.org/W1978264569","https://openalex.org/W1997199359","https://openalex.org/W2006688370","https://openalex.org/W2014369282","https://openalex.org/W2020030076","https://openalex.org/W2021777732","https://openalex.org/W2060916782","https://openalex.org/W2067500652","https://openalex.org/W2070822026","https://openalex.org/W2079799821","https://openalex.org/W2082651521","https://openalex.org/W2089507241","https://openalex.org/W2091712649","https://openalex.org/W2103297792","https://openalex.org/W2107307934","https://openalex.org/W2108891217","https://openalex.org/W2111680152","https://openalex.org/W2115499255","https://openalex.org/W2121791637","https://openalex.org/W2128631040","https://openalex.org/W2131693903","https://openalex.org/W2134170665","https://openalex.org/W2134585533","https://openalex.org/W2144883685","https://openalex.org/W2151457873","https://openalex.org/W2161006460","https://openalex.org/W2166602595","https://openalex.org/W4236127247","https://openalex.org/W6607036282"],"related_works":["https://openalex.org/W2097396510","https://openalex.org/W1554870463","https://openalex.org/W2111274946","https://openalex.org/W169802313","https://openalex.org/W1555764847","https://openalex.org/W2601954520","https://openalex.org/W2129622458","https://openalex.org/W1494225641","https://openalex.org/W2087121382","https://openalex.org/W1597906172"],"abstract_inverted_index":{"While":[0],"XML":[1,16,22,81],"has":[2,45],"been":[3,28],"widely":[4],"adopted":[5],"for":[6,14,131],"information":[7],"sharing":[8],"over":[9],"the":[10,12,31,65,71,94,104,143,149,174,181],"Internet,":[11],"need":[13],"efficient":[15,86],"access":[17,23,87,133],"control":[18,24,88,134],"naturally":[19],"arise.":[20],"Various":[21],"enforcement":[25],"mechanisms":[26],"have":[27,169],"proposed":[29],"in":[30,59,122],"research":[32],"community,":[33],"such":[34],"as":[35,107],"view-based":[36],"approaches":[37],"and":[38,49,89,113,136,153,158,179],"pre-processing":[39,105],"approaches.":[40],"Each":[41],"category":[42],"of":[43,96,176,183],"solutions":[44],"its":[46],"inherent":[47],"advantages":[48],"disadvantages.":[50],"For":[51],"instance,":[52],"view":[53,66],"based":[54],"approach":[55,106],"provides":[56,85],"high":[57],"performance":[58,182],"query":[60,90,163,184],"evaluation,":[61],"but":[62],"suffers":[63],"from":[64],"maintenance":[67],"issues.":[68],"To":[69],"remedy":[70],"problems,":[72],"we":[73,168],"propose":[74],"a":[75,108,123,127],"hybrid":[76],"approach,":[77],"namely":[78],"HyXAC:":[79],"Hybrid":[80],"Access":[82],"Control.":[83],"HyXAC":[84,101,146,172],"processing":[91],"by":[92],"maximizing":[93],"utilization":[95],"available":[97,150],"(but":[98],"constrained)":[99],"resources.":[100],"first":[102],"uses":[103],"baseline":[109],"to":[110,156,161],"process":[111],"queries":[112],"define":[114],"sub-views.":[115],"In":[116],"HyXAC,":[117],"views":[118],"are":[119],"not":[120],"defined":[121,130],"per-role":[124],"basis,":[125],"instead,":[126],"sub-view":[128],"is":[129],"each":[132],"rule,":[135],"roles":[137],"with":[138],"identical":[139],"rules":[140],"would":[141],"share":[142],"sub-view.":[144],"Moreover,":[145],"dynamically":[147],"allocates":[148],"resources":[151],"(memory":[152],"secondary":[154],"storage)":[155],"materialize":[157],"cache":[159],"sub-views":[160],"improve":[162],"performance.":[164],"With":[165],"intensive":[166],"experiments,":[167],"shown":[170],"that":[171],"optimizes":[173],"usage":[175],"system":[177],"resource,":[178],"improves":[180],"processing.":[185]},"counts_by_year":[{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
