{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T02:10:12Z","timestamp":1736475012157,"version":"3.32.0"},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387334059"},{"type":"electronic","value":"9780387334066"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/0-387-33406-8_31","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T08:55:55Z","timestamp":1153731355000},"page":"364-376","source":"Crossref","is-referenced-by-count":2,"title":["Cryptographically Enforced Personalized Role-Based Access Control"],"prefix":"10.1007","author":[{"given":"Milan","family":"Petkovi\u0107","sequence":"first","affiliation":[]},{"given":"Claudine","family":"Conrado","sequence":"additional","affiliation":[]},{"given":"Malik","family":"Hammout\u00e8ne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"D.F. Ferraiolo and D.R. Kuhn \u201cRole Based Access Control\u201d 15th National Computer Security Conference, 1992."},{"key":"31_CR2","unstructured":"The Health Insurance Portability and Accountability Act of 1996 (HIPAA), HIPAA Administrative Simplification-Regulations & Standards, http:\/\/www.cms.hhs.gov\/hipaa\/hipaa2\/regulations\/default.asp."},{"key":"31_CR3","unstructured":"HIMSS Electronic Health Record Definitional Model Version 1.0, HIMSS Electronic Health Record Committee, http:\/\/www.himss.org\/content\/files\/EHRAttributes.pdf."},{"issue":"3","key":"31_CR4","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"l","author":"S. G. Akl","year":"1983","unstructured":"Selim G. Akl and Peter D. Taylor, \u201cCryptographic solution to a problem of access control in a hierarchy\u201d, ACM Trans. Computer System, l(3):239\u2013248, 1983.","journal-title":"ACM Trans. Computer System"},{"key":"31_CR5","unstructured":"R. S. Sandhu. On some cryptographic solutions for access control in a tree hierarchy. In ACM\u2019 87: Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, IEEE Computer Society Press, pp: 405\u2013410, 1987."},{"key":"31_CR6","unstructured":"Organization for the Advancement of Structured Information Standards, http:\/\/www.oasis-open.org\/home\/index.php."},{"key":"31_CR7","unstructured":"Tim Moses, eXtensible Access Control Markup Language (XACML) Version 2.03, http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF00288961","volume":"15","author":"L. Kou","year":"1981","unstructured":"Kou, L., G. Markowsky, L. Berman, \u201cA Fast Algorithm for Steiner Trees\u201d, Acta Informatica, Springer-Verlag, 1981: vol. 15, pp. 141\u2013145.","journal-title":"Acta Informatica"},{"key":"31_CR9","unstructured":"A Survey of Broadcast Encryption, Jeremy Horwitz, Manuscript, 2003, http:\/\/mam.scu.edu\/~jhorwitz\/pubs\/b5oadcast.pdf."},{"key":"31_CR10","unstructured":"Malik Hammoutene, \u201cSecure Management of Medical Data\u201d, EPFL Master Thesis Series, 2005."},{"key":"31_CR11","unstructured":"W3C Recommendation, XML Key Management Specification (XKMS 2.0), http:\/\/www.w3.org\/TR\/xkms2\/."},{"key":"31_CR12","unstructured":"M. Petkovic, M. Hammout\u00e9ne, C. Conrado and W. Jonker, \u201cSecuring Electronic Health Records using Digital Rights Management\u201d, In Proceedings of the 10th International Symposium for Health Information Management Research (iSHIMIR), Greece 2005."},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"C. Conrado, M. Petkovic, M. vd Veen, W. vd Velde, \u201cControlled Sharing of Personal Content using Digital Rights Management\u201d, In Security in Information Systems, Eduardo Fernandez-Medina, Julio Hernandez, Javier Garcia (Eds), 3rd International Workshop on Security in Information Systems (WOSIS), Miami, USA, 2005, pp. 173\u2013185.","DOI":"10.5220\/0002573101730185"}],"container-title":["IFIP International Federation for Information Processing","Security and Privacy in Dynamic Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-33406-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T01:34:38Z","timestamp":1736472878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-33406-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9780387334059","9780387334066"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/0-387-33406-8_31","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2006]]}}}