{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:51:39Z","timestamp":1725457899116},"publisher-location":"Boston","reference-count":10,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402079001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-7901-x_4","type":"book-chapter","created":{"date-parts":[[2005,12,21]],"date-time":"2005-12-21T16:51:38Z","timestamp":1135183898000},"page":"49-65","source":"Crossref","is-referenced-by-count":5,"title":["Using Parameterized UML to Specify and Compose Access Control Models"],"prefix":"10.1007","author":[{"given":"Indrakshi","family":"Ray","sequence":"first","affiliation":[]},{"given":"Na","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dae-Kyoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Robert","family":"France","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"D.F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3), August 2001.","DOI":"10.1145\/501978.501980"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Jan J-urjens. UMLsec: Extending UML for Secure Systems Development. In UML2002, 2002.","DOI":"10.1145\/508791.508990"},{"issue":"3","key":"4_CR3","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1145\/989.991","volume":"2","author":"C. E. Landwehr","year":"1984","unstructured":"C. E. Landwehr, C. L. Heitmeyer, and J. McLean. A security model for military message systems. In ACM Transactions on Computer Systems 2(3): 198\u2013222, August, 1984.","journal-title":"ACM Transactions on Computer Systems"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Torsten Lodderstedt, David Basin, and J\u00fcrgen Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In 5th International Conference on the Unified Modeling Language, 2002.","DOI":"10.1007\/3-540-45800-X_33"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Matunda Nyanchama and Sylvia Osborn. Modeling Mandatory Access Control in Role-Based Security Systems. In IFIP Workshop on Database Security, 1995.","DOI":"10.1007\/978-0-387-34932-9_9"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Sylvia Osborn. Mandatory access control and role-based access control revisited. In Proceedings of the Second Workshop on Role-Based Access Control, 1997.","DOI":"10.1145\/266741.266751"},{"key":"4_CR7","volume-title":"Proceedings of the IEEE Workshop on Information Assurance","author":"C. E. Phillips","year":"2002","unstructured":"C. E. Phillips, S. A. Demurjian, and T. C. Ting. Toward information assurance in dynamic coalitions. In Proceedings of the IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY June 2002."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"R. Sandhu and P. Samarati. Access Control: Principles and Practice. In IEEE Communications, Volumn 32,Number 9, September 1994.","DOI":"10.1109\/35.312842"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Ravi Sandhu. Role-Based Access Control. In Advances in Computers, volume 46 Academic Press, 1998.","DOI":"10.1016\/S0065-2458(08)60206-5"},{"key":"4_CR10","unstructured":"The Object Management Group (OMG). Unified Modeling Language. Version 1.4, OMG, http:\/\/www.omg.org , September 2001."}],"container-title":["IFIP International Federation for Information Processing","Integrity and Internal Control in Information Systems VI"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-7901-X_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:16:45Z","timestamp":1619554605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-7901-X_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402079001"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/1-4020-7901-x_4","relation":{},"subject":[]}}