{"id":"https://openalex.org/W2041928155","doi":"https://doi.org/10.1145/2600176.2600204","title":"Access control policy evolution","display_name":"Access control policy evolution","publication_year":2014,"publication_date":"2014-04-08","ids":{"openalex":"https://openalex.org/W2041928155","doi":"https://doi.org/10.1145/2600176.2600204","mag":"2041928155"},"language":"en","primary_location":{"id":"doi:10.1145/2600176.2600204","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600204","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002872988","display_name":"JeeHyun Hwang","orcid":"https://orcid.org/0000-0002-0608-6138"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"JeeHyun Hwang","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028171895","display_name":"Laurie Williams","orcid":"https://orcid.org/0000-0003-3300-6540"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurie Williams","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108545096","display_name":"Mladen A. Vouk","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mladen Vouk","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002872988"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.18058496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8572862148284912},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7919436693191528},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5879222750663757},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5477662086486816},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.48873186111450195},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.47547951340675354},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4742105305194855},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3169010579586029},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11629942059516907},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07454937696456909}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8572862148284912},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7919436693191528},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5879222750663757},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5477662086486816},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.48873186111450195},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.47547951340675354},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4742105305194855},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3169010579586029},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11629942059516907},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07454937696456909},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600176.2600204","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600204","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7310706109","display_name":null,"funder_award_id":"W911NF-08-1-0105","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7493826797","display_name":null,"funder_award_id":"0910767, 1330553","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307762","display_name":"International Business Machines Corporation","ror":"https://ror.org/05hh8d621"},{"id":"https://openalex.org/F4320310013","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2617830947"],"related_works":["https://openalex.org/W2374393728","https://openalex.org/W2392916544","https://openalex.org/W2124367090","https://openalex.org/W1992436224","https://openalex.org/W2386396757","https://openalex.org/W2393973626","https://openalex.org/W2105261429","https://openalex.org/W2107355607","https://openalex.org/W2012419258","https://openalex.org/W318167434"],"abstract_inverted_index":{"Access":[0],"Control":[1],"Policies":[2],"(ACPs)":[3],"evolve.":[4],"Understanding":[5],"the":[6,17,32,39,55,80],"trends":[7,42,76],"and":[8,19,43,67,85,113],"evolution":[9,36,44,93,98,135],"patterns":[10,45,136],"of":[11,21,34,41,79,82,87,134],"ACPs":[12,47],"could":[13],"provide":[14],"guidance":[15],"about":[16],"reliability":[18],"maintenance":[20],"ACPs.":[22],"Our":[23],"research":[24],"goal":[25],"is":[26],"to":[27,126,138],"help":[28],"policy":[29,83,119],"authors":[30,120],"improve":[31],"quality":[33],"ACP":[35,56],"based":[37],"on":[38],"understanding":[40],"in":[46,77,124],"We":[48,74,91,130],"performed":[49],"an":[50,68,97],"empirical":[51],"study":[52],"by":[53],"analyzing":[54],"changes":[57],"over":[58],"time":[59],"for":[60],"two":[61],"systems:":[62],"Security":[63],"Enhanced":[64],"Linux":[65],"(SELinux),":[66],"open-source":[69],"virtual":[70],"computing":[71],"platform":[72],"(VCL).":[73],"measured":[75],"terms":[78],"number":[81],"lines":[84,86],"code":[88],"(LOC),":[89],"respectively.":[90],"observed":[92],"patterns.":[94],"For":[95],"example,":[96],"pattern":[99,116],"st1":[100,105],"\u2192":[101],"st2":[102,110],"says":[103],"that":[104,118,132],"(e.g.,":[106,111],"\"read\")":[107],"evolves":[108],"into":[109],"\"read\"":[112,128],"\"write\").":[114],"This":[115],"indicates":[117],"add":[121],"\"write\"":[122],"permission":[123],"addition":[125],"existing":[127],"permission.":[129],"found":[131],"some":[133],"appear":[137],"occur":[139],"more":[140],"frequently.":[141]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
