{"id":"https://openalex.org/W3011483940","doi":"https://doi.org/10.1145/3374664.3375725","title":"Admin-CBAC","display_name":"Admin-CBAC","publication_year":2020,"publication_date":"2020-03-13","ids":{"openalex":"https://openalex.org/W3011483940","doi":"https://doi.org/10.1145/3374664.3375725","mag":"3011483940"},"language":"en","primary_location":{"id":"doi:10.1145/3374664.3375725","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015835455","display_name":"Clara Bertolissi","orcid":"https://orcid.org/0000-0001-9283-1386"},"institutions":[{"id":"https://openalex.org/I21491767","display_name":"Aix-Marseille Universit\u00e9","ror":"https://ror.org/035xkbk20","country_code":"FR","type":"education","lineage":["https://openalex.org/I21491767"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Clara Bertolissi","raw_affiliation_strings":["Aix-Marseille Universit\u00e9, CNRS, Marseille, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Aix-Marseille Universit\u00e9, CNRS, Marseille, France","institution_ids":["https://openalex.org/I21491767","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072769917","display_name":"Maribel Fern\u00e1ndez","orcid":"https://orcid.org/0000-0001-8325-5815"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maribel Fern\u00e1ndez","raw_affiliation_strings":["King's College London, London, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"King's College London, London, United Kingdom","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072193842","display_name":"Bhavani Thuraisingham","orcid":"https://orcid.org/0000-0003-4653-2080"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bhavani Thuraisingham","raw_affiliation_strings":["University of Texas at Dallas, Richardson, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015835455"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I21491767"],"apc_list":null,"apc_paid":null,"fwci":1.8213,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.89326054,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"84"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.8944904208183289},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.7874794006347656},{"id":"https://openalex.org/keywords/decidability","display_name":"Decidability","score":0.769914984703064},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7690880298614502},{"id":"https://openalex.org/keywords/undecidable-problem","display_name":"Undecidable problem","score":0.6603749394416809},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6550048589706421},{"id":"https://openalex.org/keywords/axiom","display_name":"Axiom","score":0.6250675916671753},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5955729484558105},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.5223768353462219},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5193856358528137},{"id":"https://openalex.org/keywords/operational-semantics","display_name":"Operational semantics","score":0.4814566969871521},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4147152900695801},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39574453234672546},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.38050219416618347},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10545435547828674}],"concepts":[{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.8944904208183289},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.7874794006347656},{"id":"https://openalex.org/C153269930","wikidata":"https://www.wikidata.org/wiki/Q430001","display_name":"Decidability","level":2,"score":0.769914984703064},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7690880298614502},{"id":"https://openalex.org/C192034797","wikidata":"https://www.wikidata.org/wiki/Q3502995","display_name":"Undecidable problem","level":3,"score":0.6603749394416809},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6550048589706421},{"id":"https://openalex.org/C167729594","wikidata":"https://www.wikidata.org/wiki/Q17736","display_name":"Axiom","level":2,"score":0.6250675916671753},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5955729484558105},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.5223768353462219},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5193856358528137},{"id":"https://openalex.org/C156325763","wikidata":"https://www.wikidata.org/wiki/Q1930895","display_name":"Operational semantics","level":3,"score":0.4814566969871521},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4147152900695801},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39574453234672546},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.38050219416618347},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10545435547828674},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3374664.3375725","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-03592292v1","is_oa":false,"landing_page_url":"https://hal.science/hal-03592292","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, Mar 2020, New Orleans LA USA, France. pp.73-84, &#x27E8;10.1145/3374664.3375725&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/b6ceee9a-34ad-42e2-ab3d-9f7665479435","is_oa":false,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/b6ceee9a-34ad-42e2-ab3d-9f7665479435","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bertolissi, C, Fern\u00e1ndez, M & Thuraisingham, B 2020, Admin-CBAC : An Administration Model for Category-Based Access Control. in CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy, pp. 73-84, 10th ACM Conference on Data and Application Security and Privacy, CODASPY 2020, New Orleans, United States, 16/03/2020. https://doi.org/10.1145/3374664.3375725","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1573970904","https://openalex.org/W1997167772","https://openalex.org/W1997862012","https://openalex.org/W2000492088","https://openalex.org/W2035980452","https://openalex.org/W2053741629","https://openalex.org/W2061161497","https://openalex.org/W2065288470","https://openalex.org/W2081186654","https://openalex.org/W2084300184","https://openalex.org/W2097171586","https://openalex.org/W2128361829","https://openalex.org/W2129920522","https://openalex.org/W2146356111","https://openalex.org/W2157871935","https://openalex.org/W2164033917","https://openalex.org/W2298912813","https://openalex.org/W2327058738","https://openalex.org/W2513714797","https://openalex.org/W2567805712","https://openalex.org/W2749040653","https://openalex.org/W2778347405","https://openalex.org/W2922588763","https://openalex.org/W2947650182"],"related_works":["https://openalex.org/W2972379433","https://openalex.org/W2989332944","https://openalex.org/W2021891065","https://openalex.org/W2583549044","https://openalex.org/W2119045600","https://openalex.org/W2584984136","https://openalex.org/W2170336571","https://openalex.org/W2962928105","https://openalex.org/W2020140696","https://openalex.org/W1485718948"],"abstract_inverted_index":{"We":[0,45],"present":[1],"Admin-CBAC,":[2],"an":[3,64],"administrative":[4,38,61,69],"model":[5],"for":[6,40,68,136],"Category-":[7],"Based":[8],"Access":[9],"Control":[10],"(CBAC).":[11],"Since":[12],"most":[13,102],"of":[14,24,60,81,88,97,105],"the":[15,28,95,101],"access":[16,112],"control":[17,113],"models":[18,39],"in":[19,26,110],"use":[20,53],"nowadays":[21],"are":[22,107,123],"instances":[23],"CBAC,":[25],"particular":[27,117],"popular":[29],"RBAC":[30,41,137],"and":[31,42,52,79,83,93,125,138],"ABAC":[32,43],"models,":[33,114],"from":[34],"Admin-CBAC":[35],"we":[36,71,115],"derive":[37,58],"too.":[44],"define":[46],"Admin-":[47],"CBAC":[48],"using":[49,129],"Barker's":[50],"metamodel,":[51],"its":[54],"axiomatic":[55],"semantics":[56,67],"to":[57],"properties":[59,74,104,122],"policies.":[62],"Using":[63],"abstract":[65],"operational":[66,131],"actions,":[70],"show":[72],"how":[73],"(such":[75,85],"as":[76,86],"safety,":[77],"liveness":[78],"effectiveness":[80],"policies)":[82],"constraints":[84],"separation":[87],"duties)":[89],"can":[90,126],"be":[91,127],"checked,":[92],"discuss":[94],"impact":[96],"policy":[98],"changes.":[99],"Although":[100],"interesting":[103],"policies":[106],"generally":[108],"undecidable":[109],"dynamic":[111],"identify":[116],"cases":[118],"where":[119],"reachability":[120],"based":[121],"decidable":[124],"checked":[128],"our":[130],"semantics,":[132],"generalising":[133],"previous":[134],"results":[135],"ABACalpha.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2020-03-23T00:00:00"}
