{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:25:45Z","timestamp":1730319945414,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T00:00:00Z","timestamp":1527724800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Army Research Laboratory and the U.K. Ministry of Defense","award":["W911NF-16-3-0001"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,7]]},"DOI":"10.1145\/3205977.3208947","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T15:49:37Z","timestamp":1528386577000},"page":"205-207","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reactive Access Control Systems"],"prefix":"10.1145","author":[{"given":"Maryam","family":"Davari","sequence":"first","affiliation":[{"name":"Purdue University, West lafayette, IN, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, west lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"extensible access control markup language (xacml) version 1.0. OASIS","author":"Anderson Anne","year":"2003","unstructured":"Anne Anderson , Anthony Nadalin , B Parducci , D Engovatov , H Lockhart , M Kudo , P Humenn , S Godik , S Anderson , S Crocker , and others. 2003. extensible access control markup language (xacml) version 1.0. OASIS ( 2003 ). Anne Anderson, Anthony Nadalin, B Parducci, D Engovatov, H Lockhart, M Kudo, P Humenn, S Godik, S Anderson, S Crocker, and others. 2003. extensible access control markup language (xacml) version 1.0. OASIS (2003)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501666"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542239"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Formal Engineering Methods. Springer, 37--56","author":"Fitzgerald Bryans","year":"2007","unstructured":"JeremyW Bryans and John S Fitzgerald . 2007 . Formal engineering of XACML access control policies in VDM++ . In International Conference on Formal Engineering Methods. Springer, 37--56 . JeremyWBryans and John S Fitzgerald. 2007. Formal engineering of XACML access control policies in VDM++. In International Conference on Formal Engineering Methods. Springer, 37--56."},{"key":"e_1_3_2_1_5_1","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE third International Conference on. IEEE, 988--995","author":"Carminati Barbara","year":"2011","unstructured":"Barbara Carminati , Elena Ferrari , and Michele Guglielmi . 2011 . Secure information sharing on support of emergency management. In Privacy, Security , Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE third International Conference on. IEEE, 988--995 . Barbara Carminati, Elena Ferrari, and Michele Guglielmi. 2011. Secure information sharing on support of emergency management. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE third International Conference on. IEEE, 988--995."},{"key":"e_1_3_2_1_6_1","first-page":"257","article-title":"Interactivity for reactive access control","volume":"2008","author":"ElRakaiby Yehia","year":"2008","unstructured":"Yehia ElRakaiby , Frederic Cuppens , and Nora Cuppens-Boulahia . 2008 . Interactivity for reactive access control . Sar Ssi 2008 (2008), 257 . Yehia ElRakaiby, Frederic Cuppens, and Nora Cuppens-Boulahia. 2008. Interactivity for reactive access control. Sar Ssi 2008 (2008), 257.","journal-title":"Sar Ssi"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/503271.503219"},{"key":"e_1_3_2_1_9_1","volume-title":"Breakglass: An approach to granting emergency access to healthcare systems","author":"NEMA Joint. 2004. COCIR\/JIRA Security And Privacy Committee (SPC).","year":"2004","unstructured":"NEMA Joint. 2004. COCIR\/JIRA Security And Privacy Committee (SPC). Breakglass: An approach to granting emergency access to healthcare systems ( 2004 ). NEMA Joint. 2004. COCIR\/JIRA Security And Privacy Committee (SPC). Breakglass: An approach to granting emergency access to healthcare systems (2004)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/826036.826869"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242664"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377854"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34707-8_21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998453"},{"volume-title":"SNOOP: an event specification language for active database systems. Master's thesis","author":"Mishra Deepak","key":"e_1_3_2_1_16_1","unstructured":"Deepak Mishra . 1991. SNOOP: an event specification language for active database systems. Master's thesis . University of Florida . Deepak Mishra. 1991. SNOOP: an event specification language for active database systems. Master's thesis. University of Florida."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755719"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2012.6360113"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. 21--30","author":"Zhang Guangsen","year":"2004","unstructured":"Guangsen Zhang and Manish Parashar . 2004 . Context-aware dynamic access control for pervasive applications . In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. 21--30 . Guangsen Zhang and Manish Parashar. 2004. Context-aware dynamic access control for pervasive applications. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. 21--30."}],"event":{"name":"SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT '18"},"container-title":["Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205977.3208947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T03:51:25Z","timestamp":1673322685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3208947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,7]]},"references-count":19,"alternative-id":["10.1145\/3205977.3208947","10.1145\/3205977"],"URL":"https:\/\/doi.org\/10.1145\/3205977.3208947","relation":{},"subject":[],"published":{"date-parts":[[2018,6,7]]},"assertion":[{"value":"2018-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}