{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:22:17Z","timestamp":1730319737238,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T00:00:00Z","timestamp":1517184000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,29]]},"DOI":"10.1145\/3167918.3167961","type":"proceedings-article","created":{"date-parts":[[2018,2,21]],"date-time":"2018-02-21T11:46:16Z","timestamp":1519213576000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A system architecture for subject-centric data sharing"],"prefix":"10.1145","author":[{"given":"Mohammad Jabed Morshed","family":"Chowdhury","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Victoria, Australia"}]},{"given":"Alan","family":"Colman","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Victoria, Australia"}]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Victoria, Australia"}]},{"given":"Muhammad Ashad","family":"Kabir","sequence":"additional","affiliation":[{"name":"Charles Sturt University NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2018,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998447"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2012.2225459"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_27"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813140"},{"key":"e_1_3_2_1_7_1","volume-title":"Accepted For Publication in 51st Annual Hawaii international conference on computer sciences. IEEE.","author":"Morshed Chowdhury Mohammad Jabed","year":"2018","unstructured":"Mohammad Jabed Morshed Chowdhury , Alan Colman , Jun Han , and Muhammad Arshad Kabir . 2018 . A Policy Framework for Subject Driven Data Sharing . In Accepted For Publication in 51st Annual Hawaii international conference on computer sciences. IEEE. Mohammad Jabed Morshed Chowdhury, Alan Colman, Jun Han, and Muhammad Arshad Kabir. 2018. A Policy Framework for Subject Driven Data Sharing. In Accepted For Publication in 51st Annual Hawaii international conference on computer sciences. IEEE."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Douglas Crockford. 2006. The application\/json media type for javascript object notation (json). (2006). Douglas Crockford. 2006. The application\/json media type for javascript object notation (json). (2006).","DOI":"10.17487\/rfc4627"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210265"},{"key":"e_1_3_2_1_10_1","first-page":"076","article-title":"User-centric consent management system and method. (July 11 2006)","volume":"7","author":"Dunn Melissa W","year":"2006","unstructured":"Melissa W Dunn . 2006 . User-centric consent management system and method. (July 11 2006) . US Patent 7 , 076 ,558. Melissa W Dunn. 2006. User-centric consent management system and method. (July 11 2006). US Patent 7,076,558.","journal-title":"US Patent"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725338"},{"key":"e_1_3_2_1_12_1","volume-title":"User-managed access (uma) profile of oauth 2.0. Internet Engineering Task Force (IETF)","author":"Hardjono Thomas","year":"2015","unstructured":"Thomas Hardjono , E Maler , M Machulak , and D Catalano . 2015. User-managed access (uma) profile of oauth 2.0. Internet Engineering Task Force (IETF) ( 2015 ). Thomas Hardjono, E Maler, M Machulak, and D Catalano. 2015. User-managed access (uma) profile of oauth 2.0. Internet Engineering Task Force (IETF) (2015)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Dick Hardt. 2012. The OAuth 2.0 authorization framework. (2012). Dick Hardt. 2012. The OAuth 2.0 authorization framework. (2012).","DOI":"10.17487\/rfc6749"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2966\/scrip.090112.64"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/177492.177726"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866855.1866865"},{"key":"e_1_3_2_1_18_1","unstructured":"Steven P Miller B Clifford Neuman Jeffrey I Schiller and Jermoe H Saltzer. 1987. Kerberos authentication and authorization system. In In Project Athena Technical Plan. Citeseer. Steven P Miller B Clifford Neuman Jeffrey I Schiller and Jermoe H Saltzer. 1987. Kerberos authentication and authorization system. In In Project Athena Technical Plan . Citeseer."},{"key":"e_1_3_2_1_19_1","volume-title":"Privacy, security and trust (PST)","author":"Moniruzzaman Md","year":"2011","unstructured":"Md Moniruzzaman and Ken Barker . 2011. Delegation of access rights in a privacy preserving access control model . In Privacy, security and trust (PST) , 2011 ninth annual international conference on. IEEE , 124--133. Md Moniruzzaman and Ken Barker. 2011. Delegation of access rights in a privacy preserving access control model. In Privacy, security and trust (PST), 2011 ninth annual international conference on. IEEE, 124--133."},{"volume-title":"Public-key cryptography","author":"Salomaa Arto","key":"e_1_3_2_1_20_1","unstructured":"Arto Salomaa . 2013. Public-key cryptography . Springer Science & Business Media . Arto Salomaa. 2013. Public-key cryptography. Springer Science & Business Media."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_22_1","unstructured":"OASIS Standard. 2005. extensible access control markup language (xacml) version 2.0. (2005). OASIS Standard. 2005. extensible access control markup language (xacml) version 2.0. (2005)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.132"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"}],"event":{"name":"ACSW 2018: Australasian Computer Science Week 2018","sponsor":["CORE Computing Research and Education"],"location":"Brisband Queensland Australia","acronym":"ACSW 2018"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167918.3167961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T06:49:09Z","timestamp":1673506149000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167918.3167961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,29]]},"references-count":23,"alternative-id":["10.1145\/3167918.3167961","10.1145\/3167918"],"URL":"https:\/\/doi.org\/10.1145\/3167918.3167961","relation":{},"subject":[],"published":{"date-parts":[[2018,1,29]]},"assertion":[{"value":"2018-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}