{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:14:47Z","timestamp":1736486087554,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540352259"},{"type":"electronic","value":"9783540352266"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11775300_50","type":"book-chapter","created":{"date-parts":[[2006,6,14]],"date-time":"2006-06-14T07:51:04Z","timestamp":1150271464000},"page":"593-604","source":"Crossref","is-referenced-by-count":1,"title":["OS-DRAM: A Delegation Administration Model in a Decentralized Enterprise Environment"],"prefix":"10.1007","author":[{"given":"Changwoo","family":"Byun","sequence":"first","affiliation":[]},{"given":"Seog","family":"Park","sequence":"additional","affiliation":[]},{"given":"Sejong","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"Ferraio, D., Cugini, J., Kuhn, R.: Role-based Access Control (RBAC): Features and motivations. In: Proc. of 11th Annual Computer Security Application Conference, December 1995, pp. 241\u2013248 (1995)"},{"key":"50_CR2","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Method. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, D.: The NIST model for role-based access control: towards a unified standard. In: Proc. of Fifth ACM Workshop on Role-Based Access Control, pp. 47\u201363","DOI":"10.1145\/344287.344301"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for rolebased admini-stration of roles. ACM Trans. Inf. and Syst. Sec.\u00a01(2), 105\u2013135","DOI":"10.1145\/300830.300839"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Gavrila, S.I., Barkley, J.F.: Formal Specification for Role Based Access Control User\/Role and Role\/Role Relationship Management. In: Proc. of the 3rd ACM workshop on Role-Based Access Control, pp. 81\u201390 (1998)","DOI":"10.1145\/286884.286902"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Sandu, R., Munawer, Q.: The ARBAC99 Model for Administrative Roles. In: 15th Annual Computer Security Applications Conference, December 1999, pp. 229\u2013240 (1999)","DOI":"10.1109\/CSAC.1999.816032"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Oh, S., Sandhu, R.: \u2019A Model for Role Administration Using Organization Structure. In: Proc. of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), June 2002, pp. 155\u2013162 (2002)","DOI":"10.1145\/507711.507737"},{"key":"50_CR8","unstructured":"Cuppens, F., Balbiani, P., Benferhat, S., Deswarte, Y., Abou El Kalam, A., Elbaida, R., Mige, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: Proc. of IEEE 4th Inter-nationalWorkshop on Policies for Distributed Systems and Networks (POLICY 2003), June 2003, pp. 120\u2013130 (2003)"},{"key":"50_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1007\/978-3-540-39962-9_76","volume-title":"On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops","author":"F. Cuppens","year":"2003","unstructured":"Cuppens, F., Mige, A.: Administration Model for Or-BAC. In: Meersman, R., Tari, Z. (eds.) OTM-WS 2003. LNCS, vol.\u00a02889, pp. 754\u2013768. Springer, Heidelberg (2003)"},{"key":"50_CR10","unstructured":"Oh, S., Byun, C., Park, S.: An Organizational Structure-Based Administration Model for Decentralized Access Control. Journal of Information Science and Engineering (2005) (submitted)"},{"key":"50_CR11","unstructured":"Barka, E., Sandhu, R.: \u201cA Role-Based Delegation Model and Some Extensions. In: Proc. of 23rd National Information Systems Security Conference, NISSC (2000)"},{"issue":"3","key":"50_CR12","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L. Zhang","year":"2004","unstructured":"Zhang, L., Ahn, G.-J., Chu, B.-T.: A Rule-Based Framework for Role-Based Delegation and Revocation. ACM Transactions on Information and System Security\u00a06(3), 404\u2013441 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, X., Oh, S., Sandhu, R.: PBDM: A Flexible Delegation Model in RBAC. In: Proc. 8th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 149\u2013157 (2003)","DOI":"10.1145\/775412.775431"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11775300_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:35:49Z","timestamp":1736418949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11775300_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540352259","9783540352266"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11775300_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}