{"id":"https://openalex.org/W4242444341","doi":"https://doi.org/10.1145/2613087","title":"Proceedings of the 19th ACM symposium on Access control models and technologies","display_name":"Proceedings of the 19th ACM symposium on Access control models and technologies","publication_year":2014,"publication_date":"2014-06-25","ids":{"openalex":"https://openalex.org/W4242444341","doi":"https://doi.org/10.1145/2613087"},"language":"en","primary_location":{"id":"doi:10.1145/2613087","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6784407496452332},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6726232767105103},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6263525485992432},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5781309604644775},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.550466001033783},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.524433434009552},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.49698689579963684},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4316955506801605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3366338610649109}],"concepts":[{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6784407496452332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6726232767105103},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6263525485992432},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5781309604644775},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.550466001033783},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.524433434009552},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.49698689579963684},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4316955506801605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3366338610649109},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2613087","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4389670110","https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W2598865957","https://openalex.org/W1576092969","https://openalex.org/W4241523039"],"abstract_inverted_index":{"It":[0],"is":[1],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,54,102],"welcome":[6],"you":[7],"the":[9,29,76,95,104,107,167,173],"19th":[10],"ACM":[11],"Symposium":[12],"on":[13,37,172],"Access":[14],"Control":[15],"Models":[16],"and":[17,48,63,136,161,186,189,197,215],"Technologies":[18],"(SACMAT":[19],"2014).":[20],"This":[21],"year's":[22],"symposium":[23],"continues":[24],"its":[25],"tradition":[26],"of":[27,34,41,73,120,175],"being":[28],"premier":[30],"forum":[31],"for":[32,106,212],"presentation":[33],"research":[35],"results":[36],"leading":[38],"edge":[39],"issues":[40],"access":[42,159,176],"control,":[43,160],"including":[44,122],"models,":[45],"systems,":[46,57,59,188],"applications,":[47,58],"theory,":[49],"with":[50,145],"an":[51],"expanded":[52],"scope":[53],"include":[55],"cyber-physical":[56,187],"hardware,":[60],"cloud":[61],"computing,":[62],"usability.":[64],"58":[65],"papers":[66,115],"have":[67],"been":[68,84],"submitted":[69],"from":[70],"a":[71,118,170,209],"variety":[72,119],"countries":[74],"around":[75],"world.":[77],"Submissions":[78],"were":[79],"anonymous;":[80],"each":[81],"paper":[82],"has":[83],"reviewed":[85],"by":[86,193],"at":[87],"least":[88],"four":[89,146],"reviewers":[90],"who":[91],"are":[92],"experts":[93],"in":[94,163,178],"field.":[96],"Extensive":[97],"online":[98],"discussions":[99],"took":[100],"place":[101],"make":[103],"selections":[105],"symposium.":[108],"The":[109,138],"program":[110,139,168],"committee":[111],"finally":[112],"accepted":[113],"17":[114],"that":[116,203],"cover":[117],"topics,":[121],"Privacy":[123],"&":[124,128,131],"Compliance,":[125],"Policy":[126,134],"Management":[127],"Enforcement,":[129],"Systems":[130],"Information":[132],"Flow,":[133],"Analysis,":[135],"Applications.":[137],"again":[140],"contains":[141],"two":[142,190],"demo":[143],"sessions":[144],"demos":[147],"covering":[148],"topics":[149],"such":[150,182],"as":[151,183,208],"risk":[152],"aware":[153],"role":[154],"mining,":[155],"privacy,":[156],"attribute":[157],"based":[158],"integrity":[162],"Linux.":[164],"In":[165],"addition,":[166],"includes":[169],"panel":[171],"challenges":[174],"control":[177],"new":[179],"computing":[180],"domains,":[181],"mobile,":[184],"cloud,":[185],"keynote":[191],"talks":[192],"Dr.":[194,198],"Ari":[195],"Juels":[196],"Andrew":[199],"Clement.":[200],"We":[201],"hope":[202],"these":[204],"proceedings":[205],"will":[206],"serve":[207],"valuable":[210],"reference":[211],"security":[213],"researchers":[214],"developers.":[216]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
