{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:23Z","timestamp":1725518363609},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,20]]},"DOI":"10.1145\/2295136.2295170","type":"proceedings-article","created":{"date-parts":[[2012,6,20]],"date-time":"2012-06-20T13:33:01Z","timestamp":1340199181000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["A framework integrating attribute-based policies into role-based access control"],"prefix":"10.1145","author":[{"given":"Jingwei","family":"Huang","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"David M.","family":"Nicol","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Rakesh","family":"Bobba","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Jun Ho","family":"Huh","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ACSAC '2002","author":"Al-Kahtani M. A.","unstructured":"M. A. Al-Kahtani and R. Sandhu . A model for attribute-based user-role assignment . ACSAC '2002 . M. A. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. ACSAC '2002."},{"key":"e_1_3_2_1_2_1","unstructured":"ANSI. American National Standard for Information Technology - Role Based Access Control. 2004. ANSI. American National Standard for Information Technology - Role Based Access Control. 2004."},{"key":"e_1_3_2_1_3_1","volume-title":"access control, and formal methods","author":"Bertino E.","year":"2012","unstructured":"E. Bertino . Policies , access control, and formal methods , 2012 . Chapter in Handbook on Securing Cyber-Physical Infrastructure (in print). E. Bertino. Policies, access control, and formal methods, 2012. Chapter in Handbook on Securing Cyber-Physical Infrastructure (in print)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759508.1759526"},{"key":"e_1_3_2_1_5_1","volume-title":"Role Engineering for Enterprise Security Management","author":"Coyne E. J.","year":"2008","unstructured":"E. J. Coyne and J. M. Davis . Role Engineering for Enterprise Security Management . Artech House, Inc. , Norwood, MA, USA , 1 st edition, 2008 . E. J. Coyne and J. M. Davis. Role Engineering for Enterprise Security Management. Artech House, Inc., Norwood, MA, USA, 1st edition, 2008.","edition":"1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210265"},{"key":"e_1_3_2_1_7_1","first-page":"554","volume-title":"Proceedings of the NIST-NSA Conference","author":"Ferraiolo D. F.","year":"1992","unstructured":"D. F. Ferraiolo and D. R. Kuhn . Role-based access control . In Proceedings of the NIST-NSA Conference , pages 554 -- 563 , 1992 . D. F. Ferraiolo and D. R. Kuhn. Role-based access control. In Proceedings of the NIST-NSA Conference, pages 554--563, 1992."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266773"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317091"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880030"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775421"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998451"},{"key":"e_1_3_2_1_16_1","volume-title":"Feb.","author":"OASIS.","year":"2005","unstructured":"OASIS. Core and hierarchical role based access control (RBAC) profile of XACML v2.0 , Feb. 2005 . OASIS. Core and hierarchical role based access control (RBAC) profile of XACML v2.0, Feb. 2005."},{"key":"e_1_3_2_1_17_1","volume-title":"OASIS standard","author":"OASIS.","year":"2005","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) version 2.0 , OASIS standard , 2005 . OASIS. eXtensible Access Control Markup Language (XACML) version 2.0, OASIS standard, 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"2010 economic analysis of role-based access control, nist report","author":"O'Connor A. C.","year":"2010","unstructured":"A. C. O'Connor and R. J. Loomis . 2010 economic analysis of role-based access control, nist report , 2010 . A. C. O'Connor and R. J. Loomis. 2010 economic analysis of role-based access control, nist report, 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_20_1","volume-title":"July","author":"ITI.","year":"2011","unstructured":"UIUC- ITI. RBAC driven least privilege architecture for control systems solution requirements specification , July 2011 . Technical Documentation . UIUC-ITI. RBAC driven least privilege architecture for control systems solution requirements specification, July 2011. Technical Documentation."},{"key":"e_1_3_2_1_21_1","volume-title":"Nov.","author":"ITI.","year":"2011","unstructured":"UIUC- ITI. RBAC policy audit and review , Nov. 2011 . Technical Documentation . UIUC-ITI. RBAC policy audit and review, Nov. 2011. Technical Documentation."},{"key":"e_1_3_2_1_22_1","volume-title":"Oct.","author":"ITI.","year":"2011","unstructured":"UIUC- ITI. An RBAC specification for industrial control systems , Oct. 2011 . Technical Documentation . UIUC-ITI. An RBAC specification for industrial control systems, Oct. 2011. Technical Documentation."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805983"}],"event":{"name":"SACMAT '12: 17th ACM Symposium on Access Control Models and Technologies","location":"Newark New Jersey USA","acronym":"SACMAT '12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 17th ACM symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2295136.2295170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T14:42:19Z","timestamp":1673102539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2295136.2295170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,20]]},"references-count":23,"alternative-id":["10.1145\/2295136.2295170","10.1145\/2295136"],"URL":"https:\/\/doi.org\/10.1145\/2295136.2295170","relation":{},"subject":[],"published":{"date-parts":[[2012,6,20]]},"assertion":[{"value":"2012-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}