{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:37:23Z","timestamp":1725550643575},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291077"},{"type":"electronic","value":"9783540320722"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11560647_25","type":"book-chapter","created":{"date-parts":[[2005,10,20]],"date-time":"2005-10-20T10:04:06Z","timestamp":1129802646000},"page":"381-393","source":"Crossref","is-referenced-by-count":25,"title":["Representation and Reasoning on RBAC: A Description Logic Approach"],"prefix":"10.1007","author":[{"given":"Chen","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Nuermaimaiti","family":"Heilili","sequence":"additional","affiliation":[]},{"given":"Shengping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zuoquan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramoli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC)\u00a04, 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/10722599_8","volume-title":"Computer Security - ESORICS 2000","author":"M. Koch","year":"2000","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: A formal model for role-based access control using graph transformation. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 122\u2013139. Springer, Heidelberg (2000)"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/545186.545191","volume":"5","author":"M. Koch","year":"2002","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: A graph-based formalism for rbac. ACM Transactions on Information and System Security (TISSEC)\u00a05, 332\u2013365 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"25_CR5","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","volume":"2","author":"T.Y. Woo","year":"1993","unstructured":"Woo, T.Y., Lam, S.S.: Authorization in distributed systems: A new approach. Journal of Computer Security\u00a02, 107\u2013136 (1993)","journal-title":"Journal of Computer Security"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems\u00a015, 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Massacci, F.: Reasoning about security: A logic and a decision method for role-based access control. In: Proceeding of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU\/FAPR 1997), pp. 421\u2013435 (1997)","DOI":"10.1007\/BFb0035639"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Appel, A.W., Felten, E.W.: Proof-carrying authentication. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore (1999)","DOI":"10.1145\/319709.319718"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems\u00a026, 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1145\/581271.581276","volume":"5","author":"J. Bacon","year":"2002","unstructured":"Bacon, J., Moody, K., Yao, W.: A model of oasis role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC)\u00a05, 492\u2013540 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Transactions on Information and System Security (TISSEC)\u00a06, 71\u2013127 (2003)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"25_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/978-3-540-30549-1_54","volume-title":"AI 2004: Advances in Artificial Intelligence","author":"V.F. Crescini","year":"2004","unstructured":"Crescini, V.F., Zhang, Y.: A logic based approach for dynamic access control. In: Webb, G.I., Yu, X. (eds.) AI 2004. LNCS (LNAI), vol.\u00a03339, pp. 623\u2013635. Springer, Heidelberg (2004)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Gavrila, S.I., Ferrailolo, D.: On the formal definition of separation-of-duty policies and their composition. In: Proccedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 172\u2013185 (1998)","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Mossakowski, T., Drouineaud, M., Sohr, K.: A temporal-logic extension of role-based access control covering dynamic separation of duties. In: Proceedings of the 4th International Conference on Temporal Logic, pp. 83\u201390 (2003)","DOI":"10.1109\/TIME.2003.1214883"},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"G.J. Ahn","year":"2000","unstructured":"Ahn, G.J., Sandhu, R.: Role-based authorization constraints specification. ACM Transactions on Information and System Security (TISSEC)\u00a03, 207\u2013226 (2000)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"25_CR16","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"F. Baader","year":"2002","unstructured":"Baader, F., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2002)"},{"key":"25_CR17","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1613\/jair.334","volume":"6","author":"G.D. Giacomo","year":"1997","unstructured":"Giacomo, G.D., Lenzerini, M.: A uniform framework for concept definitions in description logics. Journal of Artificial Intelligence Research\u00a06, 87\u2013110 (1997)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0004-3702(91)90078-X","volume":"48","author":"M. Schmidt-SchauB","year":"1991","unstructured":"Schmidt-SchauB, M., Smolka, G.: Attributive concept descriptions with complements. Artifical Intelligence\u00a048, 1\u201326 (1991)","journal-title":"Artifical Intelligence"},{"key":"25_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/3-540-45744-5_59","volume-title":"Automated Reasoning","author":"V. Haarslev","year":"2001","unstructured":"Haarslev, V., Moller, R.: RACER system description. In: Gor\u00e9, R.P., Leitsch, A., Nipkow, T. (eds.) IJCAR 2001. LNCS (LNAI), vol.\u00a02083, pp. 701\u2013723. Springer, Heidelberg (2001)"},{"key":"25_CR20","unstructured":"Haarslev, V., Moller, R.: Description of the RACER system and its applications. In: International Workshop on Description Logics (DL 2001), Stanford, USA (2001)"},{"key":"25_CR21","unstructured":"RICE (RACER Interactive Client Environment), \n                    \n                      http:\/\/www.b1g-systems.com\/ronald\/rice\/"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11560647_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T22:40:12Z","timestamp":1552430412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11560647_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291077","9783540320722"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11560647_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}