{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:28:28Z","timestamp":1725568108047},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290674"},{"type":"electronic","value":"9783540334989"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11558958_119","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T10:02:16Z","timestamp":1140688936000},"page":"983-991","source":"Crossref","is-referenced-by-count":0,"title":["A Flexible Privilege Management Scheme for Role Graph Model"],"prefix":"10.1007","author":[{"given":"Yuna","family":"Jung","sequence":"first","affiliation":[]},{"given":"Eenjun","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Role-Based Access Control. IEEE Computer, 38\u201347 (February 1996)","key":"119_CR1","DOI":"10.1109\/2.485845"},{"key":"119_CR2","volume-title":"Proc. of the IFIPWorking Group 11.3,Working Conference on Database Security","author":"M. Nyanchama","year":"1994","unstructured":"Nyanchama, M., Osborn, S.L.: Access rights administration in role-based security systems. In: Proc. of the IFIPWorking Group 11.3,Working Conference on Database Security, Elsevier North-Holland, Amsterdam (1994)"},{"doi-asserted-by":"crossref","unstructured":"Nyanchama, M., Osborn, S.L.: The Role Graph Model and Conflict of Interest. ACM transactions on Information and System Security\u00a02(1) (February 1999)","key":"119_CR3","DOI":"10.1145\/300830.300832"},{"key":"119_CR4","volume-title":"Proc. of the Conf. On Computer Security","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., et al.: Role Hierarchies and Constraints for Lattice-based access controls. In: Proc. of the Conf. On Computer Security, Springer, New York (1996)"},{"unstructured":"Simon, R., Zurko, M.E.: Separation of duty in role based access control environments. In: Proc. of the 10th, IEEE Computer Society Press, Los Alamitos (1997)","key":"119_CR5"},{"unstructured":"Nyanchama, M., Osborn, S.: Access rights administration in role-based access control revisited. In: Proceedings of the IEIP Working Group 11.3 Working Conference on Database Security, Amsterdam, The Netherlands (1994)","key":"119_CR6"},{"issue":"1","key":"119_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M. Nyanchama","year":"1999","unstructured":"Nyanchama, M., Osborn, S.: The Role Graph Model and Conflict of Interest. ACM Transactions on Information and System Security\u00a02(1), 3\u201333 (1999)","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Lecture Notes in Computer Science","Applied Parallel Computing. State of the Art in Scientific Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11558958_119.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:10:36Z","timestamp":1619493036000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11558958_119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540290674","9783540334989"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11558958_119","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}