{"id":"https://openalex.org/W4299351893","doi":"https://doi.org/10.1145/2613087.2613094","title":"Path conditions and principal matching","display_name":"Path conditions and principal matching","publication_year":2014,"publication_date":"2014-06-25","ids":{"openalex":"https://openalex.org/W4299351893","doi":"https://doi.org/10.1145/2613087.2613094"},"language":"en","primary_location":{"id":"doi:10.1145/2613087.2613094","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087.2613094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109050799","display_name":"Jason Crampton","orcid":"https://orcid.org/0000-0003-2151-8426"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jason Crampton","raw_affiliation_strings":["Royal Holloway University of London, Egham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Royal Holloway University of London, Egham, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055610194","display_name":"James Sellwood","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"James Sellwood","raw_affiliation_strings":["Royal Holloway University of London, Egham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Royal Holloway University of London, Egham, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109050799"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":null,"apc_paid":null,"fwci":20.13014319,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.99135357,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"187","last_page":"198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8125536441802979},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.7631182670593262},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7079687118530273},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.6536120176315308},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.6402095556259155},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.634179413318634},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.6100751161575317},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4840032756328583},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4463028907775879},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3329770863056183},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2850334644317627},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.146463543176651},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14587441086769104},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09226983785629272}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8125536441802979},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.7631182670593262},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7079687118530273},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6536120176315308},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6402095556259155},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.634179413318634},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.6100751161575317},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4840032756328583},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4463028907775879},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3329770863056183},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2850334644317627},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.146463543176651},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14587441086769104},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09226983785629272},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2613087.2613094","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2613087.2613094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM symposium on Access control models and technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1497650555","https://openalex.org/W1555093693","https://openalex.org/W1869701259","https://openalex.org/W1975156286","https://openalex.org/W1998591172","https://openalex.org/W2022906038","https://openalex.org/W2036467405","https://openalex.org/W2063703813","https://openalex.org/W2104730303","https://openalex.org/W2123479684","https://openalex.org/W2137685284","https://openalex.org/W2166602595","https://openalex.org/W4353004773","https://openalex.org/W6608504677"],"related_works":["https://openalex.org/W2555738791","https://openalex.org/W2123296434","https://openalex.org/W2104547074","https://openalex.org/W4298042445","https://openalex.org/W2586694115","https://openalex.org/W2132693790","https://openalex.org/W2017616439","https://openalex.org/W2367441718","https://openalex.org/W2017675414","https://openalex.org/W1593822213"],"abstract_inverted_index":{"Traditional":[0],"authorization":[1,9,34,54],"policies":[2,55,105,141],"are":[3,68,106,112],"user-centric,":[4],"in":[5,13,42,64],"the":[6,36,43,50,58,72,136,149],"sense":[7],"that":[8,20,30,38,60,88],"is":[10,24,35],"defined,":[11],"ultimately,":[12],"terms":[14],"of":[15,52,71,74,91,151,162],"user":[16],"identities.":[17],"We":[18,81,117,134],"believe":[19],"this":[21],"user-centric":[22],"approach":[23],"inappropriate":[25],"for":[26,101,120,131],"many":[27],"applications,":[28],"and":[29,97,142,157],"what":[31],"should":[32],"determine":[33],"relationships":[37,59],"exist":[39,61],"between":[40,62],"entities":[41],"system.":[44],"While":[45],"recent":[46],"research":[47],"has":[48],"considered":[49],"possibility":[51],"specifying":[53],"based":[56],"on":[57],"peers":[63],"social":[65],"networks,":[66],"we":[67,124,147],"not":[69],"aware":[70],"application":[73],"these":[75],"ideas":[76,92],"to":[77,114,126,139],"general":[78],"computing":[79],"systems.":[80],"develop":[82,127],"a":[83,98,128,159],"formal":[84],"access":[85,95],"control":[86,96],"model":[87,153],"makes":[89],"use":[90,125],"from":[93],"relationship-based":[94],"two-stage":[99],"method":[100,130],"evaluating":[102,132],"policies.":[103,133],"Our":[104],"defined":[107],"using":[108,154],"path":[109,121],"conditions,":[110,122],"which":[111,123],"similar":[113],"regular":[115],"expressions.":[116],"define":[118],"semantics":[119],"rigorous":[129],"describe":[135,158],"algorithm":[137],"required":[138],"evaluate":[140],"establish":[143],"its":[144],"complexity.":[145],"Finally,":[146],"illustrate":[148],"advantages":[150],"our":[152,163],"an":[155],"example":[156],"preliminary":[160],"implementation":[161],"algorithm.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":1}],"updated_date":"2026-02-20T08:17:22.645390","created_date":"2022-10-02T00:00:00"}
