{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:34:45Z","timestamp":1740548085895,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540265474"},{"type":"electronic","value":"9783540316848"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11506157_30","type":"book-chapter","created":{"date-parts":[[2010,9,26]],"date-time":"2010-09-26T18:04:36Z","timestamp":1285524276000},"page":"358-369","source":"Crossref","is-referenced-by-count":3,"title":["Role Activation Management in Role Based Access Control"],"prefix":"10.1007","author":[{"given":"Richard W. C.","family":"Lui","sequence":"first","affiliation":[]},{"given":"Sherman S. M.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bhamidipat, V., Sandhu, R.: Push architectures for user-role assignment. In: National Information Systems Security Conference (2000)","key":"30_CR1"},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/990036.990049","volume-title":"SACMAT 2004: Proceedings of the ninth ACM symposium on Access control models and technologies","author":"R. Bhatti","year":"2004","unstructured":"Bhatti, R., Joshi, J., Bertino, E., Ghafoor, A.: X-GTRBAC admin: a decentralized administration model for enterprise wide access control. In: SACMAT 2004: Proceedings of the ninth ACM symposium on Access control models and technologies, pp. 78\u201386. ACM Press, New York (2004)"},{"doi-asserted-by":"crossref","unstructured":"Dunlop, N., Indulska, J., Raymond, K.: Dynamic policy model for large evolving enterprises. In: EDOC, p. 193 (2001)","key":"30_CR3","DOI":"10.1109\/EDOC.2001.950439"},{"issue":"3","key":"30_CR4","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"J.H.P. Eloff","year":"2001","unstructured":"Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal\u00a040(3), 666\u2013682 (2001)","journal-title":"IBM Systems Journal"},{"issue":"1","key":"30_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"D.F. Ferraiolo","year":"1999","unstructured":"Ferraiolo, D.F., Barklery, J.F., Richard Kuhn, D.: A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security\u00a02(1), 34\u201364 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"30_CR6","volume-title":"Role-based access control","author":"D.F. Ferraiolo","year":"2003","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-based access control. Artech House, Boston (2003)"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-45559-0_6","volume-title":"Middleware 2000","author":"J.H. Hine","year":"2000","unstructured":"Hine, J.H., Yao, W., Bacon, J., Moody, K.: An architecture for distributed oasis services. In: Coulson, G., Sventek, J. (eds.) Middleware 2000. LNCS, vol.\u00a01795, pp. 104\u2013120. Springer, Heidelberg (2000)"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1145\/507711.507737","volume-title":"Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002)","author":"S. Oh","year":"2002","unstructured":"Oh, S., Sandhu, R.: A model for role administration using organization structure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey, Calif., June 3-4, pp. 155\u2013162. ACM, New York (2002)"},{"doi-asserted-by":"crossref","unstructured":"Park, J.S., Sandhu, R.S., Ghanta, S.: Rbac on the web by secure cookies. In: DBSec, pp. 49\u201362 (1999)","key":"30_CR9","DOI":"10.1007\/978-0-387-35508-5_4"},{"doi-asserted-by":"crossref","unstructured":"Perwaiz, N.: Structured management of role-permission relationships. In: ACM Workshop on Role Based Access Control archive Proceedings of the sixth ACM symposium on Access control models and technologies, Chantilly, Virginia, United States, pp. 163\u2013169 (2001)","key":"30_CR10","DOI":"10.1145\/373256.373292"},{"unstructured":"Sandhu, R., Chandramouli, R.: Role based access control features in commercial database management systems. In: 21st National Information Systems Security Conference, Crystal City, Virginia, October 6-9 (1998)","key":"30_CR11"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, D.F.R., Kuhn, R.: The nist model for role-based access control: Towards a unified standard. In: ACM Workshop on Role-Based Access Control (2000)","key":"30_CR12","DOI":"10.1145\/344287.344301"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Transaction control expressions for separation of duties. In: Proc. of the Fourth Computer Security Applications Conference, pp. 282\u2013286 (1998)","key":"30_CR13","DOI":"10.1109\/ACSAC.1988.113349"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Role activation hierarchies. In: Symposium on Access Control Models and Technologies archive Proceedings of the third ACM workshop on Role-based access control, Fairfax, Virginia, United States, pp. 33\u201340 (1998) ISBN:1-58113-113-5","key":"30_CR14","DOI":"10.1145\/286884.286891"},{"unstructured":"Sandhu, R.S., Munawer, Q.: The ARBAC 1999 model for administration of roles. In: Annual Computer Security Applicarions Conference, p. 229 (1999)","key":"30_CR15"},{"doi-asserted-by":"crossref","unstructured":"Simon, R.T., Zurko, M.E.: Separation of duty in role-based environments. In: IEEE Computer Security Foundations Workshop, pp. 183\u2013194 (1997)","key":"30_CR16","DOI":"10.1109\/CSFW.1997.596811"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11506157_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T02:23:50Z","timestamp":1740536630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11506157_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540265474","9783540316848"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11506157_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}