{"id":"https://openalex.org/W2187438059","doi":"https://doi.org/10.3233/jcs-150539","title":"Event-driven RBAC","display_name":"Event-driven RBAC","publication_year":2015,"publication_date":"2015-09-22","ids":{"openalex":"https://openalex.org/W2187438059","doi":"https://doi.org/10.3233/jcs-150539","mag":"2187438059"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-150539","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-150539","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046243825","display_name":"Piero A. Bonatti","orcid":"https://orcid.org/0000-0003-1436-5660"},"institutions":[{"id":"https://openalex.org/I4210104655","display_name":"Ingegneria dei Trasporti (Italy)","ror":"https://ror.org/01fp7rv25","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210104655"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Piero Bonatti","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0,\u00a0","Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0pieroandrea.bonatti@unina.it,\u00a0clemente.galdi@unina.it"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210104655"]},{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0pieroandrea.bonatti@unina.it,\u00a0clemente.galdi@unina.it","institution_ids":["https://openalex.org/I4210104655"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026500214","display_name":"Clemente Galdi","orcid":"https://orcid.org/0000-0002-2988-700X"},"institutions":[{"id":"https://openalex.org/I4210104655","display_name":"Ingegneria dei Trasporti (Italy)","ror":"https://ror.org/01fp7rv25","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210104655"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Clemente Galdi","raw_affiliation_strings":["Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0,\u00a0","Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0pieroandrea.bonatti@unina.it,\u00a0clemente.galdi@unina.it"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210104655"]},{"raw_affiliation_string":"Dipartimento di Ingegneria Elettrica e Tecnologie dell\u2019Informazione, Universit\u00e0 di Napoli \u201cFederico\u00a0II\u201d, Via Claudio, 80125, Napoli, Italy. E-mails:\u00a0pieroandrea.bonatti@unina.it,\u00a0clemente.galdi@unina.it","institution_ids":["https://openalex.org/I4210104655"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083195994","display_name":"Davide Torres","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131308","display_name":"I.R.C.C.S. Oasi Maria SS","ror":"https://ror.org/03cvbjc43","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210131308"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Davide Torres","raw_affiliation_strings":["Publiservizi s.r.l., C.so P. Giannone, 50 - 81100 - Caserta, Italy. E-mail:\u00a0","Publiservizi s.r.l., C.so P. Giannone, 50 - 81100 - Caserta, Italy. E-mail:\u00a0torres.davide@gmail.com"],"affiliations":[{"raw_affiliation_string":"Publiservizi s.r.l., C.so P. Giannone, 50 - 81100 - Caserta, Italy. E-mail:\u00a0","institution_ids":["https://openalex.org/I4210131308"]},{"raw_affiliation_string":"Publiservizi s.r.l., C.so P. Giannone, 50 - 81100 - Caserta, Italy. E-mail:\u00a0torres.davide@gmail.com","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026500214","https://openalex.org/A5083195994"],"corresponding_institution_ids":["https://openalex.org/I4210104655","https://openalex.org/I4210131308"],"apc_list":null,"apc_paid":null,"fwci":11.2711,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.9787089,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"23","issue":"6","first_page":"709","last_page":"757"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.9074931740760803},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8595948219299316},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6856048107147217},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5644720196723938},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5360024571418762},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5359412431716919},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5259278416633606},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5215044617652893},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5124545693397522},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4901481568813324},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.46292802691459656},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4140200614929199},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.28163963556289673},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2397732436656952},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13180804252624512}],"concepts":[{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.9074931740760803},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595948219299316},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6856048107147217},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5644720196723938},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5360024571418762},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5359412431716919},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5259278416633606},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5215044617652893},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5124545693397522},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4901481568813324},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.46292802691459656},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4140200614929199},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.28163963556289673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2397732436656952},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13180804252624512},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-150539","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-150539","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1484729457","https://openalex.org/W1542283487","https://openalex.org/W1553052391","https://openalex.org/W1559018605","https://openalex.org/W1628797000","https://openalex.org/W1875062215","https://openalex.org/W1875930898","https://openalex.org/W1963957280","https://openalex.org/W1975156286","https://openalex.org/W1997842357","https://openalex.org/W1998208223","https://openalex.org/W2000952251","https://openalex.org/W2002381420","https://openalex.org/W2008869081","https://openalex.org/W2037062169","https://openalex.org/W2049536973","https://openalex.org/W2063997960","https://openalex.org/W2068189899","https://openalex.org/W2076004681","https://openalex.org/W2078590050","https://openalex.org/W2093019643","https://openalex.org/W2115403742","https://openalex.org/W2123837566","https://openalex.org/W2125061093","https://openalex.org/W2135550767","https://openalex.org/W2141189433","https://openalex.org/W2141696417","https://openalex.org/W2154765153","https://openalex.org/W2156245716","https://openalex.org/W2164396200","https://openalex.org/W2166602595","https://openalex.org/W3145128584","https://openalex.org/W4253790261","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2371841920","https://openalex.org/W2372156812","https://openalex.org/W2392187120","https://openalex.org/W2374393728","https://openalex.org/W2571946640","https://openalex.org/W2386545329","https://openalex.org/W2148952798","https://openalex.org/W2612447197","https://openalex.org/W2298912813","https://openalex.org/W2139115530"],"abstract_inverted_index":{"Context-aware":[0],"access":[1,7],"control":[2,8],"systems":[3],"should":[4],"reactively":[5],"adapt":[6],"decisions":[9],"to":[10,71,142],"dynamic":[11],"environmental":[12],"conditions.":[13],"In":[14,104],"this":[15,82],"paper":[16],"we":[17],"present":[18],"ERBAC":[19,49,160],"\u2013":[20,38],"an":[21],"event-driven":[22,76],"extension":[23],"of":[24,34,48,59,74,100,108,117,139,155],"the":[25,30,45,56,60,72,137,140,144,152],"TRBAC":[26],"model":[27,84],"that":[28,81,90,151],"allows":[29],"specification":[31],"and":[32,39,67,89,93,114,129,136],"enforcement":[33],"general":[35],"reactive":[36],"policies":[37,127],"its":[40,63,68,91,115],"implementation.":[41],"While":[42],"almost":[43],"all":[44],"individual":[46],"features":[47],"occur":[50],"separately":[51],"in":[52,65,121,159],"some":[53],"previous":[54],"model,":[55],"detailed":[57],"design":[58],"policy":[61,77,156],"language,":[62],"implementation":[64,138],"XACML,":[66],"testing":[69],"contribute":[70],"development":[73],"expressive,":[75],"frameworks":[78],"by":[79],"demonstrating":[80],"rich":[83],"can":[85],"be":[86],"satisfactorily":[87],"implemented,":[88],"expressivity":[92],"performance":[94],"are":[95],"compatible":[96,162],"with":[97,163],"a":[98,106,122],"variety":[99],"realistic":[101],"application":[102],"scenarios.":[103],"particular,":[105],"number":[107],"examples":[109],"illustrate":[110],"ERBAC\u2019s":[111],"expressive":[112],"power,":[113],"ability":[116],"handling":[118],"exceptional":[119],"situations":[120],"flexible":[123],"way,":[124],"while":[125],"keeping":[126],"compact":[128],"manageable.":[130],"The":[131],"prototype":[132],"extends":[133],"XACML\u2019s":[134],"language":[135],"PDP":[141],"support":[143],"new":[145],"model.":[146],"Systematic":[147],"scalability":[148],"experiments":[149],"show":[150],"computational":[153],"cost":[154],"rule":[157],"evaluation":[158],"is":[161],"real-world":[164],"applications.":[165]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
