{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:10Z","timestamp":1725558970491},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258629"},{"type":"electronic","value":"9783540320456"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11424857_105","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T23:49:45Z","timestamp":1279064985000},"page":"973-982","source":"Crossref","is-referenced-by-count":2,"title":["Verification of UML-Based Security Policy Model"],"prefix":"10.1007","author":[{"given":"Sachoun","family":"Park","sequence":"first","affiliation":[]},{"given":"Gihwon","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"105_CR1","unstructured":"Common Criteria for Information Technology Security Evaluation, Version 2.1, CCIMB-99-031 (August 1999), \n                    \n                      http:\/\/csrc.nist.gov\/cc\/CC-v2.1.html"},{"key":"105_CR2","unstructured":"http:\/\/alloy.mit.edu\/"},{"key":"105_CR3","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House (2003)"},{"key":"105_CR4","unstructured":"http:\/\/www.db.informatik.uni-bremen.de\/projects\/USE\/index.html"},{"issue":"3","key":"105_CR5","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/545186.545191","volume":"5","author":"M. Koch","year":"2002","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: A graph-based formalism for RBAC. ACM, Trans. Inf. Syst. Secur\u00a05(3), 332\u2013365 (2002)","journal-title":"ACM, Trans. Inf. Syst. Secur"},{"key":"105_CR6","doi-asserted-by":"crossref","unstructured":"Koch, M., Parisi-Presicce, F.: Formal Access Control Analysis in the Software Development Process. In: Proc. of Formal Methods in Security Engineering: From Specifications to Code (FMSE 2003) (2003)","DOI":"10.1145\/1035429.1035437"},{"key":"105_CR7","doi-asserted-by":"crossref","unstructured":"Koch, M., Parisi-Presicce, F.: Visual Specifications of Policies and Their Verification. In: FASE 2003, pp. 278\u2013293 (2003)","DOI":"10.1007\/3-540-36578-8_20"},{"key":"105_CR8","unstructured":"Zao, J., Wee, H., Chu, J., Jackson, D.: RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis. In: SACMAT (2003)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11424857_105.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:05:44Z","timestamp":1619507144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11424857_105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258629","9783540320456"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11424857_105","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}