{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:21:36Z","timestamp":1725459696596},"publisher-location":"Boston","reference-count":10,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402081278"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8128-6_17","type":"book-chapter","created":{"date-parts":[[2006,2,22]],"date-time":"2006-02-22T16:45:28Z","timestamp":1140626728000},"page":"251-264","source":"Crossref","is-referenced-by-count":13,"title":["A Design for Parameterized Roles"],"prefix":"10.1007","author":[{"given":"Mei","family":"Ge","sequence":"first","affiliation":[]},{"given":"Sylvia L.","family":"Osborn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"17_CR1","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM TISSEC, 4(3):224\u2013275, 2001.","journal-title":"ACM TISSEC"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Cecilia M. Ionita and Sylvia L. Osborn. Privilege administration for the role graph model. In Research Directions in Data and Applications Security, Proc. IFIP WG11.3 Working Conference on Database Security, pages 15\u201325. Kluwer Academic Publishers, 2003.","DOI":"10.1007\/978-0-387-35697-6_2"},{"key":"17_CR3","volume-title":"PhD thesis","author":"M. Nyanchama","year":"1994","unstructured":"M. Nyanchama. Commercial Integrity, Roles and Object Orientation. PhD thesis, Department of Computer Science, The University of Western Ontario, London, Canada, Sept. 1994."},{"key":"17_CR4","unstructured":"M. Nyanchama and S. L. Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgenstern, and C. E. Landwehr, editors, Database Security, VIII, Status and Prospects WG11.3 Working Conference on Database Security, pages 37\u201356. North-Holland, 1994."},{"issue":"l","key":"17_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M. Nyanchama","year":"1999","unstructured":"M. Nyanchama and S. L. Osborn. The role graph model and conflict of interest. ACM TISSEC, 2(l):3\u201333, 1999.","journal-title":"ACM TISSEC"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"S. Osborn and Y. Guo. Modeling users in role-based access control In Fifth ACM Workshop on Role-Based Access Control, pages 31\u201338, Berlin, Germany, July 2000.","DOI":"10.1145\/344287.344299"},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/103140.103144","volume":"16","author":"F. Rabitti","year":"1991","unstructured":"F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM Trans Database Syst, 16(1):88\u2013131, 1991.","journal-title":"ACM Trans Database Syst"},{"issue":"1","key":"17_CR8","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R. Sandhu","year":"1999","unstructured":"R. Sandhu, V. Bhamidipati, and Q Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans. on Information and Systems Security, 2(1):105\u2013135, Feb. 1999.","journal-title":"ACM Trans. on Information and Systems Security"},{"key":"17_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29:38\u201347, Feb. 1996.","journal-title":"IEEE Computer"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Jingzhu Wang and Sylvia L. Osborn. A role-based approach to access control for XML databases. In Proc. ACM SACMAT, 2004.","DOI":"10.1145\/990036.990047"}],"container-title":["IFIP International Federation for Information Processing","Research Directions in Data and Applications Security XVIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8128-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:27:17Z","timestamp":1619555237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8128-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402081278"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8128-6_17","relation":{},"subject":[]}}