{"id":"https://openalex.org/W2806047119","doi":"https://doi.org/10.1145/3205977.3205999","title":"Multi-Party Access Control","display_name":"Multi-Party Access Control","publication_year":2018,"publication_date":"2018-06-07","ids":{"openalex":"https://openalex.org/W2806047119","doi":"https://doi.org/10.1145/3205977.3205999","mag":"2806047119"},"language":"en","primary_location":{"id":"doi:10.1145/3205977.3205999","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3205977.3205999","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205999","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205999","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062519505","display_name":"Anna Squicciarini","orcid":"https://orcid.org/0000-0002-7396-1895"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anna Cinzia Squicciarini","raw_affiliation_strings":["Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082663800","display_name":"Sarah Rajtmajer","orcid":"https://orcid.org/0000-0002-1464-0848"},"institutions":[{"id":"https://openalex.org/I4210086312","display_name":"Scientific Solutions (United States)","ror":"https://ror.org/000dzg547","country_code":"US","type":"company","lineage":["https://openalex.org/I4210086312"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sarah Michele Rajtmajer","raw_affiliation_strings":["Quantitative Scientific Solutions, Washington, USA"],"affiliations":[{"raw_affiliation_string":"Quantitative Scientific Solutions, Washington, USA","institution_ids":["https://openalex.org/I4210086312"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083686418","display_name":"Nicola Zannone","orcid":"https://orcid.org/0000-0002-9081-5996"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Nicola Zannone","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062519505"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":2.3831,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.91237316,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6142403483390808},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4852473735809326},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.45687946677207947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33938169479370117},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11884137988090515}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6142403483390808},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4852473735809326},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.45687946677207947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33938169479370117},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11884137988090515}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3205977.3205999","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3205977.3205999","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205999","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire/c28fd09b-a411-484d-9e39-442f6729c8a4","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/c28fd09b-a411-484d-9e39-442f6729c8a4","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Squicciarini, A C, Rajtmajer, S M & Zannone, N 2018, Multi-party access control : Requirements, state of the art and open challenges. in SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc., pp. 49, 23rd ACM Symposium on Access Control Models and Technologies (SACMAT 2018), Indianapolis, Indiana, United States, 13/06/18. https://doi.org/10.1145/3205977.3205999","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:publications/c28fd09b-a411-484d-9e39-442f6729c8a4","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85049307129&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Squicciarini, A C, Rajtmajer, S M & Zannone, N 2018, Multi-party access control : Requirements, state of the art and open challenges. in SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc., pp. 49, 23rd ACM Symposium on Access Control Models and Technologies (SACMAT 2018), Indianapolis, Indiana, United States, 13/06/18. https://doi.org/10.1145/3205977.3205999","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/c28fd09b-a411-484d-9e39-442f6729c8a4","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/c28fd09b-a411-484d-9e39-442f6729c8a4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"doi:10.1145/3205977.3205999","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3205977.3205999","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3205977.3205999","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4332111615","display_name":null,"funder_award_id":"M2MGrids (13011)","funder_id":"https://openalex.org/F4320313144","funder_display_name":"ITEA"},{"id":"https://openalex.org/G7914255127","display_name":null,"funder_award_id":"1453080","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320313144","display_name":"ITEA","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2806047119.pdf","grobid_xml":"https://content.openalex.org/works/W2806047119.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W2782208146"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Multi-party":[0],"access":[1,12,118],"control":[2,13,119],"is":[3,53,70,85],"gaining":[4],"attention":[5],"and":[6,15,22,31,44,61,74,121,141],"prominence":[7],"within":[8],"the":[9,29,75,89,93,101,128,131],"community,":[10],"as":[11,57],"models":[14],"systems":[16],"are":[17,81],"faced":[18],"with":[19,125],"complex,":[20],"jointly-owned":[21],"jointly-managed":[23],"content.":[24],"Traditional":[25],"single-user":[26],"approaches":[27],"lack":[28],"richness":[30],"flexibility":[32],"to":[33,127],"accommodate":[34],"these":[35,105,123],"scenarios,":[36],"resulting":[37],"in":[38,50],"undesired":[39],"disclosure":[40],"of":[41,78,104,115,130],"sensitive":[42],"data":[43,59,64],"resources.":[45],"Moving":[46],"forward":[47],"fundamental":[48,113],"work":[49],"this":[51,109,135],"area":[52],"critical.":[54],"In":[55,108],"particular,":[56],"personal":[58],"amasses":[60],"algorithms":[62],"for":[63,96,145],"mining":[65],"improve,":[66],"personally":[67],"identifiable":[68],"information":[69],"more":[71],"readily":[72],"inferred":[73],"practical":[76],"implications":[77],"privacy":[79],"decisions":[80],"relatively":[82],"opaque.":[83],"This":[84],"true":[86],"even":[87],"at":[88],"individual":[90],"level,":[91],"but":[92],"parallel":[94],"problem":[95],"jointly":[97],"managed":[98],"content":[99],"involves":[100],"cross":[102],"product":[103],"complex":[106],"outcomes.":[107],"presentation,":[110],"we":[111,137],"discuss":[112],"requirements":[114],"successful":[116],"multi-party":[117],"mechanisms":[120],"contextualize":[122],"concepts":[124],"respect":[126],"state":[129],"art.":[132],"Based":[133],"on":[134],"analysis,":[136],"identify":[138],"open":[139],"challenges":[140],"draw":[142],"a":[143],"roadmap":[144],"future":[146],"work.":[147]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2018-06-13T00:00:00"}
