{"id":"https://openalex.org/W4249034095","doi":"https://doi.org/10.3233/jcs-2012-0462","title":"Preface","display_name":"Preface","publication_year":2012,"publication_date":"2012-09-28","ids":{"openalex":"https://openalex.org/W4249034095","doi":"https://doi.org/10.3233/jcs-2012-0462"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2012-0462","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-2012-0462","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs462?id=journal-of-computer-security%2Fjcs462","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs462?id=journal-of-computer-security%2Fjcs462","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075577852","display_name":"Gilles Barthe","orcid":"https://orcid.org/0000-0002-3853-1777"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gilles Barthe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050142189","display_name":"Jorge Cu\u00e9llar","orcid":"https://orcid.org/0000-0002-2364-359X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jorge Cuellar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Javier Lopez","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5002011805","display_name":"Alexander Pretschner","orcid":"https://orcid.org/0000-0002-5573-1201"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alexander Pretschner","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075577852"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62475255,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"20","issue":"4","first_page":"307","last_page":"308"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.8406000137329102,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.8406000137329102,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11010","display_name":"Logic, Reasoning, and Knowledge","score":0.006899999920278788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.005900000222027302,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4442172050476074}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4442172050476074}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-2012-0462","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-2012-0462","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs462?id=journal-of-computer-security%2Fjcs462","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3233/jcs-2012-0462","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-2012-0462","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs462?id=journal-of-computer-security%2Fjcs462","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4249034095.pdf","grobid_xml":"https://content.openalex.org/works/W4249034095.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655","https://openalex.org/W2359140296"],"abstract_inverted_index":{"This":[0],"series":[1],"of":[2,37,53,82,89,108,124,143,146,166,185,213,241,249,261,273,285,288,296,314,359],"Workshops":[3],"is":[4,188,244,306,364],"organized":[5],"by":[6,114,117,337],"ERCIM":[7],"(European":[8],"Research":[9],"Consortium":[10],"in":[11,25,42,63,334,361],"Informatics":[12],"and":[13,19,34,40,49,97,119,148,158,173,201,206,256,276,290,327,346,367],"Mathematics)":[14],"Working":[15],"Group":[16],"on":[17,31,209,224],"Security":[18],"Trust":[20],"Management,":[21],"that":[22,73,153,219,222,253,267,292,301],"was":[23],"established":[24],"2005":[26],"to":[27,50,138,151,178,263,321],"foster":[28],"collaborative":[29],"work":[30],"all":[32],"theoretical":[33],"practical":[35],"aspects":[36],"security,":[38],"trust":[39,98],"privacy":[41],"ICT":[43],"within":[44],"the":[45,54,58,70,79,122,140,183,210,242,247,271,279,286,315,349],"European":[46,59],"research":[47,55],"community":[48,56],"increase":[51],"co-operation":[52],"with":[57],"industry.The":[60],"four":[61],"articles":[62,85],"this":[64],"Special":[65],"Issue":[66],"were":[67,74],"selected":[68],"from":[69,330],"17":[71],"papers":[72],"accepted":[75],"for":[76,170,215,234,319],"presentation":[77],"at":[78],"Workshop,":[80],"out":[81],"40":[83],"submissions.The":[84],"cover":[86],"representative":[87],"topics":[88],"STM,":[90],"such":[91],"as":[92],"access":[93,111,130],"control,":[94],"privacy,":[95],"security":[96],"policies,":[99],"or":[100],"formal":[101],"methods.The":[102],"paper":[103,195,325],"\"Scalable":[104],"automated":[105],"symbolic":[106],"analysis":[107],"administrative":[109,127],"role-based":[110],"control":[112,131],"policies":[113,172,221,318],"SMT":[115,176],"solving\"":[116],"Armando":[118],"Ranise":[120],"considers":[121,348],"problem":[123],"automatically":[125,180],"analysing":[126],"role":[128],"based":[129],"(ARBAC)":[132],"policies.Such":[133],"analyses":[134],"are":[135,156],"extremely":[136],"useful":[137],"understand":[139],"subtle":[141],"implications":[142],"complex":[144],"combinations":[145],"authorizations,":[147],"more":[149],"generally":[150],"ensure":[152],"ARBAC":[154,171],"systems":[155],"scalable":[157],"can":[159,368],"evolve":[160],"gracefully.Authors":[161],"isolate":[162],"a":[163,202,250,264,310,353],"new":[164],"class":[165],"properties":[167],"(user-role":[168],"reachability)":[169],"leverage":[174],"state-of-the-art":[175],"solvers":[177],"check":[179],"their":[181,186,194],"validity.Finally,":[182],"strength":[184],"approach":[187],"demonstrated":[189],"through":[190,246,257,309],"extensive":[191],"experimental":[192],"evaluation.In":[193],"\"Stateful":[196],"authorization":[197,217,238,317],"logic":[198,243,305],"-proof":[199],"theory":[200],"case":[203,312],"study\",":[204],"Garg":[205],"Pfenning":[207],"embark":[208],"proof-theoretical":[211],"study":[212,313],"logics":[214],"stateful":[216,237],"policies;":[218],"is,":[220],"depend":[223],"externally":[225],"controlled":[226],"conditions.They":[227],"introduce":[228],"an":[229,258,282,298],"expressive":[230],"logic,":[231],"called":[232],"BL,":[233,289],"reasoning":[235],"about":[236],"policies.The":[239],"expressiveness":[240],"achieved":[245],"adoption":[248],"modal":[251],"connective":[252],"allows":[254],"delegation,":[255],"explicit":[259],"modeling":[260],"time.Thanks":[262],"careful":[265],"design":[266],"crisply":[268],"separates":[269],"between":[270],"validity":[272],"state":[274],"predicates":[275],"BL":[277,304],"judgments,":[278],"authors":[280],"provide":[281],"elegant":[283],"treatment":[284],"meta-theory":[287],"prove":[291],"it":[293],"enjoys":[294],"admissibility":[295],"cut,":[297],"essential":[299],"property":[300],"entails":[302],"consistency.The":[303],"empirically":[307],"validated":[308],"detailed":[311],"US":[316],"accessing":[320],"sensitive":[322,331],"intelligence":[323],"information.The":[324],"\"Modeling":[326],"preventing":[328],"inferences":[329],"value":[332],"distributions":[333],"data":[335],"release\"":[336],"Bezzi,":[338],"De":[339],"Capitani":[340],"di":[341],"Vimercati,":[342],"Foresti,":[343],"Livraga,":[344],"Samarati":[345],"Sassi":[347],"following":[350],"setting:":[351],"assume":[352],"database":[354],"contains":[355],"many":[356],"entries,":[357],"each":[358],"which":[360],"its":[362],"own":[363],"considered":[365],"non-sensitive":[366],"be":[369],"declassified,":[370],"but":[371],"some":[372]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2022-05-12T00:00:00"}
