{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:29:33Z","timestamp":1725892173623},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540362975"},{"type":"electronic","value":"9783540362999"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11795131_88","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T15:48:02Z","timestamp":1159285682000},"page":"604-609","source":"Crossref","is-referenced-by-count":0,"title":["Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules"],"prefix":"10.1007","author":[{"given":"Qi","family":"Xie","sequence":"first","affiliation":[]},{"given":"Dayou","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"88_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"2","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Model. IEEE Computer\u00a02, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"88_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"3","author":"D. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, R.: Proposed NIST Standard for role-based access control: towards a unified standard. ACM Transaction on Information and System Security (TISSEC)\u00a03, 224\u2013274 (2001)","journal-title":"ACM Transaction on Information and System Security (TISSEC)"},{"key":"88_CR3","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M., Sandhu, R.: A Model for Attribute-Based User-Role Assignment. In: Proc. 18th Annu. Computer Security Applications Conf., Las Vegas, Nevada, USA, pp. 353\u2013362 (2002)","DOI":"10.1109\/CSAC.2002.1176307"},{"key":"88_CR4","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M., Sandhu, R.: Induced Role Hierarchies with Attribute-Based RBAC. In: Proc. ACM SACMAT 2003, Villa Gallia, Como, Italy, pp. 142\u2013148 (2003)","DOI":"10.1145\/775412.775430"},{"key":"88_CR5","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M., Sandhu, R.: Rule-Based RBAC with Negative Authorization. In: Proc. 20th Annu. Computer Security Applications Conf., Tucson, Arizona, USA, pp. 405\u2013415 (2004)","DOI":"10.1109\/CSAC.2004.32"},{"key":"88_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/POLICY.2003.1206963","volume-title":"Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003)","author":"A. Uszok","year":"2003","unstructured":"Uszok, A., Bradshaw, J., Jeffers, R., et al.: KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy, June 4-6, 2003, pp. 93\u201398. IEEE Computer Society, Los Alamitos, CA (2003)"},{"key":"88_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, Springer, Heidelberg (2001)"},{"key":"88_CR8","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/POLICY.2003.1206958","volume-title":"Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003)","author":"L. Kagal","year":"2003","unstructured":"Kagal, L., Finin, T., Johshi, A.: A Policy Language for Pervasive Computing Environment. In: Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy, June 4-6, 2003, pp. 63\u201376. IEEE Computer Society, Los Alamitos, CA (2003)"},{"key":"88_CR9","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"F. Baader","year":"2003","unstructured":"Baader, F., Calvanese, D., et al.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2003)"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11795131_88.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:24:23Z","timestamp":1619508263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11795131_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540362975","9783540362999"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11795131_88","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}