{"id":"https://openalex.org/W2302160760","doi":"https://doi.org/10.1145/2875491.2875492","title":"A Policy Framework for Data Fusion and Derived Data Control","display_name":"A Policy Framework for Data Fusion and Derived Data Control","publication_year":2016,"publication_date":"2016-03-08","ids":{"openalex":"https://openalex.org/W2302160760","doi":"https://doi.org/10.1145/2875491.2875492","mag":"2302160760"},"language":"en","primary_location":{"id":"doi:10.1145/2875491.2875492","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2875491.2875492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052646282","display_name":"Jerry den Hartog","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Jerry den Hartog","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083686418","display_name":"Nicola Zannone","orcid":"https://orcid.org/0000-0002-9081-5996"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Nicola Zannone","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052646282"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":5.9914,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.95691507,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"47","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sensor-fusion","display_name":"Sensor fusion","score":0.7719064950942993},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7102924585342407},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.648470938205719},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6410926580429077},{"id":"https://openalex.org/keywords/fuse","display_name":"Fuse (electrical)","score":0.5545797944068909},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5437849760055542},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5165940523147583},{"id":"https://openalex.org/keywords/fusion","display_name":"Fusion","score":0.506672203540802},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48523497581481934},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48301801085472107},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2207888960838318},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19637686014175415},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15344777703285217}],"concepts":[{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.7719064950942993},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7102924585342407},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.648470938205719},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6410926580429077},{"id":"https://openalex.org/C141353440","wikidata":"https://www.wikidata.org/wiki/Q182221","display_name":"Fuse (electrical)","level":2,"score":0.5545797944068909},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5437849760055542},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5165940523147583},{"id":"https://openalex.org/C158525013","wikidata":"https://www.wikidata.org/wiki/Q2593739","display_name":"Fusion","level":2,"score":0.506672203540802},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48523497581481934},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48301801085472107},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2207888960838318},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19637686014175415},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15344777703285217},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2875491.2875492","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2875491.2875492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/3f045733-024e-40c2-82da-4ed789a760b2","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/3f045733-024e-40c2-82da-4ed789a760b2","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"den Hartog, J & Zannone, N 2016, A policy framework for data fusion and derived data control. in ABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. Association for Computing Machinery, Inc., New York, pp. 47-57, 2016 ACM International Workshop on Attribute Based Access Control (ABAC 2016), New Orleans, United States, 11/03/16. https://doi.org/10.1145/2875491.2875492","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/3f045733-024e-40c2-82da-4ed789a760b2","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/3f045733-024e-40c2-82da-4ed789a760b2","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 47 - 57","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G937346136","display_name":null,"funder_award_id":"AU2EU","funder_id":"https://openalex.org/F4320334960","funder_display_name":"Seventh Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W17829384","https://openalex.org/W1544088314","https://openalex.org/W1550369758","https://openalex.org/W1559405249","https://openalex.org/W1568281349","https://openalex.org/W1971724950","https://openalex.org/W2000289851","https://openalex.org/W2012419258","https://openalex.org/W2015315002","https://openalex.org/W2033661878","https://openalex.org/W2090143299","https://openalex.org/W2092422002","https://openalex.org/W2097404228","https://openalex.org/W2101206521","https://openalex.org/W2107943057","https://openalex.org/W2122049982","https://openalex.org/W2125419198","https://openalex.org/W2127672407","https://openalex.org/W2134894205","https://openalex.org/W2143129186","https://openalex.org/W2144786703","https://openalex.org/W2153414845","https://openalex.org/W2154564703","https://openalex.org/W2158449659","https://openalex.org/W2167160509","https://openalex.org/W2295240344","https://openalex.org/W2403354125","https://openalex.org/W2738444131","https://openalex.org/W3141585064","https://openalex.org/W4242998987","https://openalex.org/W4300836214"],"related_works":["https://openalex.org/W2123296434","https://openalex.org/W2555738791","https://openalex.org/W2104547074","https://openalex.org/W4298042445","https://openalex.org/W2586694115","https://openalex.org/W2132693790","https://openalex.org/W2132659060","https://openalex.org/W2031992971","https://openalex.org/W2367441718","https://openalex.org/W2017616439"],"abstract_inverted_index":{"Recent":[0],"years":[1],"have":[2,26],"seen":[3],"an":[4,90],"exponential":[5],"growth":[6],"of":[7,12,20,44,55,81,98,109,118],"the":[8,38,42,53,66,70,77,96,107,125,128,132],"collection":[9],"and":[10,24,31,58,73,79,105,135],"processing":[11],"data":[13,33,46,56,60,99],"from":[14,100],"heterogeneous":[15],"sources":[16,104],"for":[17,68,154],"a":[18],"variety":[19],"purposes.":[21],"Several":[22],"methods":[23],"techniques":[25],"been":[27],"proposed":[28],"to":[29,94],"transform":[30],"fuse":[32],"into":[34],"\\\\useful\"":[35],"information.":[36],"However,":[37],"security":[39],"aspects":[40],"concerning":[41],"fusion":[43,57,71,97,133,136,143],"sensitive":[45],"are":[47],"often":[48],"overlooked.":[49],"This":[50],"paper":[51],"investigates":[52],"problem":[54],"derived":[59,82,155],"control.":[61],"In":[62],"particular,":[63],"we":[64,88],"identify":[65],"requirements":[67],"regulating":[69],"process":[72],"eliciting":[74],"restrictions":[75],"on":[76,85,141],"access":[78,120],"usage":[80],"data.":[83,156],"Based":[84],"these":[86],"requirements,":[87],"propose":[89],"attribute-based":[91],"policy":[92],"framework":[93,114],"control":[95,108,121],"di":[101,110],"erent":[102,111],"information":[103],"under":[106],"authorities.":[112],"The":[113],"comprises":[115],"two":[116],"types":[117],"policies:":[119],"policies,":[122,137],"which":[123,138],"define":[124,139],"authorizations":[126],"governing":[127],"resources":[129],"used":[130],"in":[131],"process,":[134],"constraints":[140],"allowed":[142],"processes.":[144],"We":[145],"also":[146],"discuss":[147],"how":[148],"such":[149],"policies":[150],"can":[151],"be":[152],"obtained":[153]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
