{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:03:05Z","timestamp":1725552185962},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_26","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"328-331","source":"Crossref","is-referenced-by-count":2,"title":["A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security"],"prefix":"10.1007","author":[{"given":"Anirban","family":"Sengupta","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aniruddha","family":"Mukhopadhyay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Koel","family":"Ray","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aveek Guha","family":"Roy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dipankar","family":"Aich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mridul Sankar","family":"Barik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chandan","family":"Mazumdar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Roy, et al.: ESRML: A Markup Language for Enterprise Security Requirement Specification. In: Proceedings of IEEE INDICON 2004, held at IIT, Kharagpur, December 20-22 (2004)","DOI":"10.1109\/INDICO.2004.1497807"},{"key":"26_CR2","unstructured":"Mazumdar, et al.: Final Technical Report for Project Development of Validated Security Processes and Methodologies for Web-Based Enterprises (2003)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Sengupta, A., Mukhopadhyay, A., Mallick, A.S.: Preliminary Technical Report on the Development of Web-enabled Enterprise Security Management Framework based on a Unified Formal Model of Enterprise Information System Security, Technical Report, Project WebSecurity-II (CDC-JU) (June 2004)","DOI":"10.1007\/11593980_26"},{"key":"26_CR4","unstructured":"Bell, D., La Padula, L.: Secure Computer Systems: Mathematical Foundations and Model. MITRE Report MTR 2574, vol.\u00a02 (November 1973)"},{"key":"26_CR5","unstructured":"Biba, K.J.: Integrity Considerations for Secure Computer Systems. MTR-3153, MITRE Corporation, Bedford, MA (June 1975)"},{"key":"26_CR6","first-page":"184","volume-title":"Proceedings IEEE Symposium Security and Privacy","author":"D. Clark","year":"1987","unstructured":"Clark, D., Wilson, D.: A Comparison of Commercial and Military Security Policies. In: Proceedings IEEE Symposium Security and Privacy, pp. 184\u2013194. IEEE Comp Soc Press, Los Alamitos (1987)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Lattice-based Access Control Models. IEEE Computer, 9\u201319 (November 1993)","DOI":"10.1109\/2.241422"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Sandhu, R., et al.: Role-based Access Control Models. IEEE Computer (February 1996)","DOI":"10.1109\/2.485845"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:58Z","timestamp":1605643378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11593980_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}