{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:04:04Z","timestamp":1725465844813},"publisher-location":"Boston","reference-count":13,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"0387298266"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-31167-x_8","type":"book-chapter","created":{"date-parts":[[2006,6,2]],"date-time":"2006-06-02T15:23:54Z","timestamp":1149261834000},"page":"121-137","source":"Crossref","is-referenced-by-count":0,"title":["A Hierarchical Release Control Policy Framework"],"prefix":"10.1007","author":[{"given":"Chao","family":"Yao","sequence":"first","affiliation":[]},{"given":"William H.","family":"Winsborough","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Piero A. Bonatti, Sabrina De Capitani di Vimercati, and Pierangela Samarati. A modular approach to composing access control policies. In ACM Conference on Computer and Communications Security, pages 164\u2013173, 2000.","key":"8_CR1","DOI":"10.1145\/352600.352623"},{"doi-asserted-by":"crossref","unstructured":"Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, and Duminda Wijesekera. Provisions and obligations in policy management and security applications. In VLDB, pages 502\u2013513, 2002.","key":"8_CR2","DOI":"10.1016\/B978-155860869-6\/50051-2"},{"issue":"5","key":"8_CR3","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. E. Denning","year":"1976","unstructured":"Dorothy E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236\u2013243, 1976.","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Simon N. Foley. A model for secure information flow. In IEEE Symposium on Security and Privacy, pages 248\u2013258, 1989.","key":"8_CR4","DOI":"10.1109\/SECPRI.1989.36299"},{"doi-asserted-by":"crossref","unstructured":"Allen Van Gelder. The alternating fixpoint of logic programs with negation. In Proceedings of the Eighth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, March 29\u201331, 1989, Philadelphia, Pennsylvania, pages 1\u201310. ACM Press, 1989.","key":"8_CR5","DOI":"10.1145\/73721.73722"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26(2):214\u2013260, 2001.","journal-title":"ACM Trans. Database Syst."},{"doi-asserted-by":"crossref","unstructured":"John W. Lloyd. Foundations of Logic Programming, Second Edition. Springer, 1987.","key":"8_CR7","DOI":"10.1007\/978-3-642-83189-8"},{"doi-asserted-by":"crossref","unstructured":"Andrew C. Myers and Barbara Liskov. A decentralized model for information flow control. In SOSP, pages 129\u2013142, 1997.","key":"8_CR8","DOI":"10.1145\/268998.266669"},{"doi-asserted-by":"crossref","unstructured":"Catherine D. McCollum, J. R. Messing, and LouAnna Notargiacomo. Beyond the pale of mac and dac-defining new forms of access control. In IEEE Symposium on Security and Privacy, pages 190\u2013200, 1990.","key":"8_CR9","DOI":"10.1109\/RISP.1990.63850"},{"issue":"4","key":"8_CR10","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/69.617048","volume":"9","author":"P. Samarati","year":"1997","unstructured":"Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, and Sushil Jajodia. Information flow control in object-oriented systems. IEEE Trans. Knowl. Data Eng., 9(4):524\u2013538, 1997.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R. S. Sandhu","year":"1999","unstructured":"Ravi S. Sandhu, Venkata Bhamidipati, and Qamar Munawer. The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur., 2(1):105\u2013135, 1999.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"8_CR12","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. S. Sandhu","year":"1996","unstructured":"Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38\u201347, 1996.","journal-title":"IEEE Computer"},{"doi-asserted-by":"crossref","unstructured":"Duminda Wijesekera and Sushil Jajodia. Policy algebras for access control the predicate case. In ACM Conference on Computer and Communications Security, pages 171\u2013180, 2002.","key":"8_CR13","DOI":"10.1145\/586110.586134"}],"container-title":["IFIP International Federation for Information Processing","Security Management, Integrity, and Internal Control in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-31167-X_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T01:08:45Z","timestamp":1619485725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-31167-X_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387298266"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/0-387-31167-x_8","relation":{},"subject":[]}}