{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:15Z","timestamp":1725551595806},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_10","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"134-147","source":"Crossref","is-referenced-by-count":5,"title":["An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies"],"prefix":"10.1007","author":[{"given":"Janice","family":"Warner","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ravi","family":"Mukkamala","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"crossref","first-page":"365","DOI":"10.3233\/JCS-2003-11306","volume":"11","author":"C. Altenschmidt","year":"2003","unstructured":"Altenschmidt, C., Biskup, J., Flegel, U., Karabulut, Y.: Secure mediation: Requirements, design, and architecture. Journal of Computer Security\u00a011(3), 365\u2013398 (2003)","journal-title":"Journal of Computer Security"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-540-30555-2_43","volume-title":"Distributed Computing and Internet Technology","author":"V. Atluri","year":"2004","unstructured":"Atluri, V., Warner, J.: Automatic enforcement of access control policies among dynamic coalitions. In: Ghosh, R.K., Mohanty, H. (eds.) ICDCIT 2004. LNCS, vol.\u00a03347, pp. 369\u2013378. Springer, Heidelberg (2004)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bharadwaj, V., Baras, J.: A framework for automated negotiation of access control policies. In: Proceedings of DISCEX III (2003)","DOI":"10.1109\/DISCEX.2003.1194968"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Cohen, E., Winsborough, W., Thomas, R., Shands, D.: Models for coalition-based access control (cbac). In: SACMAT (2002)","DOI":"10.1145\/507711.507727"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed nist standard for role-based access control. In: TISSEC (2001)","DOI":"10.1145\/501978.501980"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Maria, L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM TODS (June 2001)","DOI":"10.1145\/383891.383894"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Khurana, H., Gavrila, S., Bobba, R., Koleva, R., Sonalker, A., Dinu, E., Gligor, V., Baras, J.: Integrated security services for dynamic coalitions. In: Proc. of the DISCEX III (2003)","DOI":"10.1109\/DISCEX.2003.1194908"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Koch, M., Mancini, L., Parisi-Presicce, F.: On the specification and evolution of access control policies. In: SACMAT (May 2001)","DOI":"10.1145\/373256.373280"},{"key":"10_CR9","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: IEEE Symposium on Security and Privacy, pp. 114\u2013130 (2002)"},{"issue":"1","key":"10_CR10","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. Journal of Computer Security\u00a011(1), 35\u201386 (2003)","journal-title":"Journal of Computer Security"},{"key":"10_CR11","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring rbac to enforce mandatory and dac policies. In: ACM TISSEC (May 2000)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Philips, C., Charles, E., Ting, T., Demurjian, S.: Towards information assurance in dynamic coalitions. In: IEEE IAW, USMA (February 2002)","DOI":"10.1145\/507711.507726"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Philips, C., Ting, T.C., Demurjian, S.: Information sharing and security in dynamic coalitions. In: SACMAT (2002)","DOI":"10.1145\/507711.507726"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: FMSE 2004 (October 2004)","DOI":"10.1145\/1029133.1029140"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Warner, J., Atluri, V., Mukkamala, R.: A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions. In: Proceedings of IFIP 11.3 (2005)","DOI":"10.1007\/11535706_19"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security\u00a06(1), 1\u201342 (2003)","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:52Z","timestamp":1605643372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11593980_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}