{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:39:34Z","timestamp":1725457174881},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375142"},{"type":"electronic","value":"9780306470080"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-47008-x_23","type":"book-chapter","created":{"date-parts":[[2005,12,12]],"date-time":"2005-12-12T18:28:25Z","timestamp":1134412105000},"page":"259-270","source":"Crossref","is-referenced-by-count":2,"title":["User Role-Based Security Model for a Distributed Environment"],"prefix":"10.1007","author":[{"given":"S.","family":"Demurjian","sequence":"first","affiliation":[]},{"given":"T.C.","family":"Ting","sequence":"additional","affiliation":[]},{"given":"J.","family":"Balthazar","sequence":"additional","affiliation":[]},{"given":"H.","family":"Ren","sequence":"additional","affiliation":[]},{"given":"C.","family":"Phillips","sequence":"additional","affiliation":[]},{"given":"P.","family":"Barr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"K. Arnold, et al., The JINI Specification, Addison-Wesley, 1999."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"S. Demurjian and T.C. Ting, \u201cTowards a Definitive Paradigm for Security in Object-Oriented Systems and Applications\u201d, Journal of Computer Security, Vol. 5,No. 4, 1997.","DOI":"10.3233\/JCS-1997-5404"},{"key":"23_CR3","volume-title":"ACM MOBICON 96","author":"A. Fox","year":"1996","unstructured":"A. Fox and S. Gribble, \u201cSecurity on the Move: Indirect Authentication Using Kerberos\u201d, ACM MOBICON 96, Rye, NY, 1996."},{"key":"23_CR4","unstructured":"F. H. Lochovsky and C. C. Woo, \u201cRole-Based Security in Data Base Management Systems\u201d, in Database Security: Status and Prospects, C. Landwehr (ed.), North-Holland, 1988."},{"key":"23_CR5","volume-title":"The Component Object Model (Technical Overview)","author":"Microsoft Corporation","year":"1995","unstructured":"Microsoft Corporation, The Component Object Model (Technical Overview), Microsoft Press, Redmond, WA, 1995"},{"key":"23_CR6","unstructured":"C. Nueman and T. Ts\u2019o, \u201cAn Authorization Service for Computer Networks\u201d, Comm. of the ACM, Vol. 32,No. 9, Sept. 94."},{"key":"23_CR7","unstructured":"Object Management Group, The Common Object Request Broker: Architecture and Specification, Rev. 2.0, MA, July 1995."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Oppliger, R. \u201cInternet Security: Firewalls and Beyond\u201d, Comm. of the ACM, Vol. 40No. 5, May 1997.","DOI":"10.1145\/253769.253802"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"M. Reiter and S. Stubblebine, \u201cAuthentication Metric Analysis and Design\u201d, ACM Trans. On Information and System Security, Vol. 2, No. 2, May 1999.","DOI":"10.1145\/317087.317088"},{"key":"23_CR10","unstructured":"W. Rosenberry, D. Kenney, and G. Fischer, Understanding DCE, O\u2019Reilly & Associates, 1992."},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"R. Sandhu, et al., \u201cRole-Based Access Control Models\u201d, IEEE Computer, Vol. 29,No. 2, Feb. 1996.","DOI":"10.1109\/2.485845"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"R. Sandhu and J. Park, \u201cDecentralized User-Role Assignment for Web-based Intranets\u201d, Proc. of the 3rd ACM Wksp. on Role-Based. Access Control, Fairfax, VA, Oct. 1998.","DOI":"10.1145\/286884.286887"},{"key":"23_CR13","unstructured":"D. Spooner, \u201cThe Impact of Inheritance on Security in Object-Oriented Database Systems\u201d, in Database Security, II: Status and. Prospects, C. Landwehr (ed.), North-Holland, 1989."},{"key":"23_CR14","unstructured":"V. Swarup, \u201cTrust Appraisal and Secure Routing of Mobile Agents\u201d, Proc. of 1997 Workshop on Foundations for Secure Mobile Code. (DARPA), March 1997."},{"key":"23_CR15","unstructured":"Walsh, T., Paciorek, N., and Wong, D. \u201cSecurity and Reliability in Concordia\u201d, Proc. of the 31st Hawaii Intl. Conf. on System Sciences. (HICSS\u201998), 1998."},{"key":"23_CR16","unstructured":"http:\/\/www.engr.uconn.edu\/steve\/urbsdreproj.html"}],"container-title":["IFIP International Federation for Information Processing","Data and Application Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-47008-X_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T14:26:18Z","timestamp":1586615178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-47008-X_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375142","9780306470080"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-306-47008-x_23","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2002]]}}}