{"id":"https://openalex.org/W2534097425","doi":"https://doi.org/10.1145/2976749.2989068","title":"POSTER","display_name":"POSTER","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2534097425","doi":"https://doi.org/10.1145/2976749.2989068","mag":"2534097425"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2989068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001385360","display_name":"Rajkumar P.V.","orcid":null},"institutions":[{"id":"https://openalex.org/I48205209","display_name":"Texas Southern University","ror":"https://ror.org/05ch0aw77","country_code":"US","type":"education","lineage":["https://openalex.org/I48205209"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rajkumar P.V.","raw_affiliation_strings":["Texas Southern University, Houston, TX, USA"],"affiliations":[{"raw_affiliation_string":"Texas Southern University, Houston, TX, USA","institution_ids":["https://openalex.org/I48205209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038692973","display_name":"Ravi Sandhu","orcid":"https://orcid.org/0000-0002-3165-1813"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ravi Sandhu","raw_affiliation_strings":["University of Texas San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001385360"],"corresponding_institution_ids":["https://openalex.org/I48205209"],"apc_list":null,"apc_paid":null,"fwci":3.9944,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94437757,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1802","last_page":"1804"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.8513222336769104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.583488941192627},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5519704222679138},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4896996319293976},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.44029346108436584},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.42671793699264526},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.37643149495124817},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10473194718360901}],"concepts":[{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.8513222336769104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.583488941192627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5519704222679138},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4896996319293976},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.44029346108436584},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.42671793699264526},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.37643149495124817},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10473194718360901},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2989068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G1056823103","display_name":null,"funder_award_id":"CNS- 1111925","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8824585768","display_name":null,"funder_award_id":"CNS-1423481","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1997862012","https://openalex.org/W2006652217","https://openalex.org/W2037027824","https://openalex.org/W2080649936","https://openalex.org/W2084300184","https://openalex.org/W2090447181","https://openalex.org/W2096814801","https://openalex.org/W2121381561","https://openalex.org/W2128361829","https://openalex.org/W2129920522","https://openalex.org/W2166029049","https://openalex.org/W2166602595"],"related_works":["https://openalex.org/W2494121465","https://openalex.org/W4377233172","https://openalex.org/W1854749775","https://openalex.org/W4312971597","https://openalex.org/W2129556718","https://openalex.org/W1970818898","https://openalex.org/W2350665531","https://openalex.org/W4210648132","https://openalex.org/W2020340787","https://openalex.org/W2902858910"],"abstract_inverted_index":{"Administrative":[0],"rights":[1,13,26],"are":[2,95,116],"more":[3,43],"powerful":[4],"permissions":[5],"and":[6,83,92,124],"checking":[7,38],"accountability":[8,65,85,105],"of":[9,11,20,66,80,86,99,106],"execution":[10],"admin":[12,39,67],"is":[14,42],"an":[15],"important":[16],"security":[17,33,81,87,122,128],"measure.":[18],"Most":[19],"the":[21,64,70,78,90,104,121],"administrative":[22,55],"RBAC":[23],"models":[24],"distribute":[25],"to":[27,46,62],"multiple":[28],"administrators.":[29,88],"Though":[30],"such":[31],"decentralized":[32,71],"management":[34],"has":[35],"difficulties":[36],"in":[37,50,57,69,112,120,138],"accountability,":[40],"it":[41],"efficient":[44],"compared":[45],"centralized":[47],"approach,":[48],"particularly":[49],"large":[51],"organizations.":[52],"We":[53],"introduced":[54],"obligations":[56],"ARBAC":[58],"as":[59],"a":[60,109],"way":[61],"improve":[63,84],"users":[68],"systems.":[72],"The":[73],"proposed":[74],"approach":[75],"would":[76,130],"reduce":[77],"potential":[79],"risk":[82],"As":[89],"cloud":[91],"mobile":[93],"applications":[94],"becoming":[96],"integral":[97],"part":[98],"business":[100],"information":[101],"systems,":[102],"ensuring":[103],"admins":[107],"play":[108],"vital":[110],"role":[111],"system":[113],"security.":[114],"Obligations":[115],"well":[117],"studied":[118],"feature":[119],"literature":[123],"adding":[125],"them":[126],"into":[127],"administration":[129],"open":[131],"up":[132],"many":[133],"possibilities":[134],"for":[135],"future":[136],"developments":[137],"this":[139],"direction.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-10-28T00:00:00"}
