{"id":"https://openalex.org/W2134893444","doi":"https://doi.org/10.1145/319171.319186","title":"The uses of role hierarchies in access control","display_name":"The uses of role hierarchies in access control","publication_year":1999,"publication_date":"1999-10-28","ids":{"openalex":"https://openalex.org/W2134893444","doi":"https://doi.org/10.1145/319171.319186","mag":"2134893444"},"language":"en","primary_location":{"id":"doi:10.1145/319171.319186","is_oa":true,"landing_page_url":"https://doi.org/10.1145/319171.319186","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319186","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Role-based access control","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319186","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108784768","display_name":"Jonathan Moffett","orcid":null},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jonathan D. Moffett","raw_affiliation_strings":["Department of Computer Science, University of York, Heslington, York YO10 5DD, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of York, Heslington, York YO10 5DD, UK","institution_ids":["https://openalex.org/I52099693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065619732","display_name":"Emil Lupu","orcid":"https://orcid.org/0000-0002-2844-3917"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Emil C. Lupu","raw_affiliation_strings":["Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108784768"],"corresponding_institution_ids":["https://openalex.org/I52099693"],"apc_list":null,"apc_paid":null,"fwci":13.4738,"has_fulltext":true,"cited_by_count":74,"citation_normalized_percentile":{"value":0.98370594,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"153","last_page":"160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.7457878589630127},{"id":"https://openalex.org/keywords/queen","display_name":"Queen (butterfly)","score":0.7075530886650085},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.600598156452179},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.38255834579467773},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3676433563232422}],"concepts":[{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.7457878589630127},{"id":"https://openalex.org/C2781321516","wikidata":"https://www.wikidata.org/wiki/Q310836","display_name":"Queen (butterfly)","level":3,"score":0.7075530886650085},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.600598156452179},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.38255834579467773},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3676433563232422},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C2780653484","wikidata":"https://www.wikidata.org/wiki/Q22651","display_name":"Hymenoptera","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/319171.319186","is_oa":true,"landing_page_url":"https://doi.org/10.1145/319171.319186","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319186","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Role-based access control","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/319171.319186","is_oa":true,"landing_page_url":"https://doi.org/10.1145/319171.319186","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319171.319186","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Role-based access control","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2134893444.pdf","grobid_xml":"https://content.openalex.org/works/W2134893444.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W137900245","https://openalex.org/W1526804922","https://openalex.org/W1573156240","https://openalex.org/W2023300255","https://openalex.org/W2065076704","https://openalex.org/W2100798283","https://openalex.org/W2101465039","https://openalex.org/W2102412856","https://openalex.org/W2144794336","https://openalex.org/W2152505375","https://openalex.org/W2162171351","https://openalex.org/W2166602595","https://openalex.org/W2316457297"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W649410576","https://openalex.org/W4229490663","https://openalex.org/W4250559856","https://openalex.org/W4256613351","https://openalex.org/W635590649","https://openalex.org/W4235414885","https://openalex.org/W2809069473","https://openalex.org/W1496923603"],"abstract_inverted_index":{"The":[0,63],"value":[1],"of":[2,13,26,45,65,74,86,94,100,122,134,183,201],"roIe-based":[3],"access":[4,20,79,115,146],"control":[5,55,88,147],"(RBAC)":[6],"is":[7,15,33,68],"now":[8,34],"well":[9],"recognised.":[10],"One":[11],"aspect":[12],"it":[14],"the":[16,24,46,54,71,84,92,98,108,112,120,135,158,171,185,189,199],"ability":[17],"to":[18,69,157,188],"make":[19,193],"decisions":[21,50],"based":[22],"upon":[23,154],"position":[25],"a":[27,30,131,181],"role":[28,75,123,139,164,202],"in":[29,77,107,125,204],"hierarchy.":[31],"It":[32],"recognised":[35],"that":[36,48,57,163,175],"there":[37],"are":[38,58,177],"some":[39,167],"problems":[40],"associated":[41],"with":[42,53],"this,":[43],"because":[44],"risk":[47],"these":[49],"may":[51,141],"conflict":[52],"principles":[56],"applied":[59],"within":[60,83,130,170],"an":[61,145],"organisation.":[62],"aim":[64],"this":[66],"paper":[67],"identify":[70],"possible":[72,168],"uses":[73,121,169],"hierarchies":[76,124,140,165,203],"simplifying":[78],"rules,":[80],"while":[81],"remaining":[82],"constraints":[85,153],"organisational":[87],"principles.":[89],"We":[90,117,161,192],"use":[91],"concept":[93],"authority":[95,136,159,190],"state,":[96,137],"i.e.,":[97],"set":[99],"fixed":[101],"and":[102,105,150],"variable":[103],"policies":[104],"rules":[106],"system":[109],"which":[110],"influence":[111],"Reference":[113],"Monitor's":[114],"decisions.":[116],"then":[118],"consider":[119],"two":[126],"separate":[127],"contexts:":[128],"first,":[129],"static":[132,172],"view":[133],"where":[138],"be":[142],"used":[143],"by":[144],"decision":[148],"facility;":[149],"second,":[151],"as":[152,180],"permissible":[155,186],"changes":[156,187],"state.":[160,191],"conclude":[162],"have":[166],"view,":[173],"but":[174],"they":[176],"more":[178],"important":[179],"means":[182],"constraining":[184],"proposals":[194],"for":[195],"further":[196],"research":[197],"on":[198],"place":[200],"controlling":[205],"change.":[206]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
