{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:02:02Z","timestamp":1725559322190},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540280620"},{"type":"electronic","value":"9783540315858"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11533733_2","type":"book-chapter","created":{"date-parts":[[2005,11,13]],"date-time":"2005-11-13T05:02:48Z","timestamp":1131858168000},"page":"22-35","source":"Crossref","is-referenced-by-count":0,"title":["Secure Role Activation and Authorization in the Enterprise Environment"],"prefix":"10.1007","author":[{"given":"Richard W. C.","family":"Lui","sequence":"first","affiliation":[]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights (2003), http:\/\/eprint.iacr.org\/curr\/"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"D.F. Ferraiolo","year":"1999","unstructured":"Ferraiolo, D.F., Barklery, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security\u00a02(1), 34\u201364 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"2_CR3","volume-title":"Role-based access control","author":"D.F. Ferraiolo","year":"2003","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-based access control. Artech House, Boston (2003)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Hitchens, M., Varadharajan, V., Saunders, G.: Policy administration domains. In: ACISP, pp. 286\u2013302 (2002)","DOI":"10.1007\/3-540-45450-0_23"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/BFb0028478","volume-title":"Information and Communications Security","author":"S. Kim","year":"1997","unstructured":"Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 223\u2013232. Springer, Heidelberg (1997)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Lee, G., Kim, W., Kim, D.-K., Yeh, H.: Effective web-related resource security using distributed role hierarchy. In: WAIM, pp. 87\u201396 (2004)","DOI":"10.1007\/978-3-540-27772-9_10"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Lui, R.W.C., Chow, S.S.M., Hui, L.C.K., Yiu, S.M.: Role activation management in role based access control. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 358\u2013369. Springer, Heidelberg (2005) (to appear)","DOI":"10.1007\/11506157_30"},{"key":"2_CR8","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. on Fundamentals\u00a0E79-A(9), 1338\u20131354 (1996)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-540-25980-0_13","volume-title":"Public Key Infrastructure","author":"J.A. Montenegro","year":"2004","unstructured":"Montenegro, J.A., Moya, F.: A practical approach of X.509 attribute certificate framework as support to obtain privilege delegation. In: Katsikas, S.K., Gritzalis, S., L\u00f3pez, J. (eds.) EuroPKI 2004. LNCS, vol.\u00a03093, pp. 160\u2013172. Springer, Heidelberg (2004)"},{"key":"2_CR10","unstructured":"Nicolosi, A., Krohn, M., Dodis, Y., Eres, D.: Proactive two-party signatures for user authentication. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, February 2003, pp. 233\u201324 (2003)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Park, J.S., Sandhu, R.S.: RBAC on the web by smart certificates. In: ACM Workshop on Role-Based Access Control, pp. 1\u20139 (1999), citeseer.nj.nec.com\/park99rbac.html","DOI":"10.1145\/319171.319172"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Park, J.S., Sandhu, R.S., Ghanta, S.: RBAC on the web by secure cookies. In: DBSec, pp. 49\u201362 (1999)","DOI":"10.1007\/978-0-387-35508-5_4"},{"key":"2_CR13","unstructured":"Sandhu, R., Chandramouli, R.: Role based access control features in commercial database management systems. In: 21st National Information Systems Security Conference, Crystal City, Virginia, October 6-9 (1998)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT\/LCS\/TM-82 (1977)","DOI":"10.21236\/ADA606588"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"C.-P. Schnorr","year":"1990","unstructured":"Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Simon, R.T., Zurko, M.E.: Separation of duty in role-based environments. In: IEEE Computer Security Foundations Workshop, pp. 183\u2013194 (1997)","DOI":"10.1109\/CSFW.1997.596811"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11533733_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:09:33Z","timestamp":1605643773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11533733_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540280620","9783540315858"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11533733_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}