{"id":"https://openalex.org/W2086356375","doi":"https://doi.org/10.1145/2557547.2557581","title":"Consistency checking in access control","display_name":"Consistency checking in access control","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2086356375","doi":"https://doi.org/10.1145/2557547.2557581","mag":"2086356375"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557581","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081857149","display_name":"Anja Remshagen","orcid":"https://orcid.org/0000-0002-2011-1379"},"institutions":[{"id":"https://openalex.org/I5950314","display_name":"University of West Georgia","ror":"https://ror.org/01cqxk816","country_code":"US","type":"education","lineage":["https://openalex.org/I5950314"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anja Remshagen","raw_affiliation_strings":["University of West Georgia, Carrollton, GA, USA"],"affiliations":[{"raw_affiliation_string":"University of West Georgia, Carrollton, GA, USA","institution_ids":["https://openalex.org/I5950314"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101863952","display_name":"Li Yang","orcid":"https://orcid.org/0000-0003-0314-503X"},"institutions":[{"id":"https://openalex.org/I5950314","display_name":"University of West Georgia","ror":"https://ror.org/01cqxk816","country_code":"US","type":"education","lineage":["https://openalex.org/I5950314"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Li Yang","raw_affiliation_strings":["University of West Georgia, Carrollton, GA, USA"],"affiliations":[{"raw_affiliation_string":"University of West Georgia, Carrollton, GA, USA","institution_ids":["https://openalex.org/I5950314"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5081857149"],"corresponding_institution_ids":["https://openalex.org/I5950314"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1963203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"139","last_page":"142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8287258148193359},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7691078186035156},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.7510421872138977},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7406230568885803},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.6211509108543396},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.619560956954956},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.617343008518219},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5187723636627197},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5084761381149292},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4458089768886566},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3479299545288086},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1223197877407074},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09628990292549133}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8287258148193359},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7691078186035156},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.7510421872138977},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7406230568885803},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.6211509108543396},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.619560956954956},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.617343008518219},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5187723636627197},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5084761381149292},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4458089768886566},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3479299545288086},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1223197877407074},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09628990292549133},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557547.2557581","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1534217561","https://openalex.org/W1967221886","https://openalex.org/W1980437932","https://openalex.org/W2133527541","https://openalex.org/W2154765153","https://openalex.org/W2166602595","https://openalex.org/W4245630182"],"related_works":["https://openalex.org/W2373984226","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2361337511","https://openalex.org/W1513229083","https://openalex.org/W2358774039","https://openalex.org/W2353815999","https://openalex.org/W4390864104","https://openalex.org/W2364540050","https://openalex.org/W2124367090"],"abstract_inverted_index":{"As":[0],"access":[1,25],"control":[2,26],"models":[3],"have":[4,19],"become":[5],"more":[6],"complex,":[7],"tools":[8],"should":[9],"be":[10,52],"developed":[11],"to":[12,28,33],"support":[13],"the":[14,35,43],"maintenance":[15,37],"of":[16,45],"policies.":[17],"We":[18,40],"adapted":[20],"a":[21,30,55],"powerful":[22],"privacy-aware":[23],"role-based":[24],"model":[27],"incorporate":[29],"context-restriction":[31],"component":[32],"alleviate":[34],"policy":[36],"complexity":[38],"issue.":[39],"discuss":[41],"how":[42],"process":[44],"entering":[46],"policies":[47],"and":[48],"user-specified":[49],"rules":[50],"can":[51],"guided":[53],"by":[54],"system":[56],"that":[57],"evaluates":[58],"permission":[59],"assignments":[60],"when":[61],"they":[62],"are":[63],"entered.":[64]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
