{"id":"https://openalex.org/W2067106503","doi":"https://doi.org/10.1145/319171.319175","title":"On the increasing importance of constraints","display_name":"On the increasing importance of constraints","publication_year":1999,"publication_date":"1999-10-28","ids":{"openalex":"https://openalex.org/W2067106503","doi":"https://doi.org/10.1145/319171.319175","mag":"2067106503"},"language":"en","primary_location":{"id":"doi:10.1145/319171.319175","is_oa":true,"landing_page_url":"https://doi.org/10.1145/319171.319175","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319175","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Role-based access control","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319175","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055045569","display_name":"Trent Jaeger","orcid":"https://orcid.org/0000-0002-4964-1170"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Trent Jaeger","raw_affiliation_strings":["IBM T. J. Watson Research Center, Hawthorne, NY","IBM T.J. Watson Research Center, Hawthorne, NY"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Hawthorne, NY","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"IBM T.J. Watson Research Center, Hawthorne, NY","institution_ids":["https://openalex.org/I1341412227"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055045569"],"corresponding_institution_ids":["https://openalex.org/I1341412227"],"apc_list":null,"apc_paid":null,"fwci":14.6986,"has_fulltext":true,"cited_by_count":72,"citation_normalized_percentile":{"value":0.98514474,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11010","display_name":"Logic, Reasoning, and Knowledge","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watson","display_name":"Watson","score":0.923743724822998},{"id":"https://openalex.org/keywords/ibm","display_name":"IBM","score":0.8430153131484985},{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.816744327545166},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5968820452690125},{"id":"https://openalex.org/keywords/center","display_name":"Center (category theory)","score":0.5279088616371155},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4572443962097168},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.3714037537574768},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07878980040550232}],"concepts":[{"id":"https://openalex.org/C2776608531","wikidata":"https://www.wikidata.org/wiki/Q12253","display_name":"Watson","level":2,"score":0.923743724822998},{"id":"https://openalex.org/C70388272","wikidata":"https://www.wikidata.org/wiki/Q5968558","display_name":"IBM","level":2,"score":0.8430153131484985},{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.816744327545166},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5968820452690125},{"id":"https://openalex.org/C2779463800","wikidata":"https://www.wikidata.org/wiki/Q5062222","display_name":"Center (category theory)","level":2,"score":0.5279088616371155},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4572443962097168},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.3714037537574768},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07878980040550232},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C8010536","wikidata":"https://www.wikidata.org/wiki/Q160398","display_name":"Crystallography","level":1,"score":0.0},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/319171.319175","is_oa":true,"landing_page_url":"https://doi.org/10.1145/319171.319175","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319175","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Role-based access control","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/319171.319175","is_oa":true,"landing_page_url":"https://doi.org/10.1145/319171.319175","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319175","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Role-based access control","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2067106503.pdf","grobid_xml":"https://content.openalex.org/works/W2067106503.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1588895954","https://openalex.org/W1636102454","https://openalex.org/W1975156286","https://openalex.org/W1977434720","https://openalex.org/W1997862012","https://openalex.org/W2038953226","https://openalex.org/W2053741629","https://openalex.org/W2057108693","https://openalex.org/W2081186654","https://openalex.org/W2100798283","https://openalex.org/W2104909586","https://openalex.org/W2111753337","https://openalex.org/W2160730496","https://openalex.org/W2166602595","https://openalex.org/W4233010915","https://openalex.org/W4298134634"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3174693904","https://openalex.org/W2902037120","https://openalex.org/W2313409890","https://openalex.org/W2244083478","https://openalex.org/W4239406214","https://openalex.org/W1035030678","https://openalex.org/W2967949125","https://openalex.org/W1986704677","https://openalex.org/W4281622825"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"examine":[4],"how":[5],"the":[6,16,19,31],"addition":[7],"of":[8,18,33],"rolebased":[9],"access":[10],"control":[11],"(RBAC)":[12],"model":[13],"features":[14],"affect":[15],"complexity":[17],"RBAC":[20,27],"constraint":[21],"models.":[22],"Constraints":[23],"are":[24],"used":[25],"in":[26],"models":[28],"to":[29,37],"constrain":[30],"assignment":[32],"permissions":[34],"and":[35],"principals":[36],"roles":[38],"(among":[39],"other":[40],"things).":[41]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
