{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:37:26Z","timestamp":1725543446412},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540370338"},{"type":"electronic","value":"9783540370352"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11811220_15","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T08:40:48Z","timestamp":1153730448000},"page":"164-175","source":"Crossref","is-referenced-by-count":11,"title":["An OWL-Based Approach for RBAC with Negative Authorization"],"prefix":"10.1007","author":[{"given":"Nuermaimaiti","family":"Heilili","sequence":"first","affiliation":[]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhenxing","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zuoquan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T. Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American\u00a0284, 34\u201343 (2001)","journal-title":"Scientific American"},{"unstructured":"American National Standards\u00a0Institute, I.: American national standard for information technology - role based access control (2004) ANSI INCITS 359-2004, \n                    \n                      http:\/\/csrc.nist.gov\/rbac\/","key":"15_CR2"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-540-39718-2_26","volume-title":"The Semantic Web - ISWC 2003","author":"L. Kagal","year":"2003","unstructured":"Kagal, L., Finin, T.W., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 402\u2013418. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T., Joshi, A.: A policy language for pervasive computing environment. In: Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy, pp. 63\u201376 (2003)","key":"15_CR4","DOI":"10.1109\/POLICY.2003.1206958"},{"doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy, pp. 93\u201398 (2003)","key":"15_CR5","DOI":"10.1109\/POLICY.2003.1206963"},{"doi-asserted-by":"crossref","unstructured":"Bradshaw, J., Uszok, A., Jeffers, R., Suri, N., Hayes, P., Burstein, M., Acquisti, A., Benyo, B., Breedy, M., Carvalho, M., Diller, D., Johnson, M., Kulkarni, S., Lott, J., Sierhuis, M., Hoof, R.V.: Representation and reasoning for daml-based policy and domain services in kaos and nomads. In: Proceedings of the Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003), Melbourne, Australia, pp. 835\u2013842 (2003)","key":"15_CR6","DOI":"10.1145\/860575.860709"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, p. 18. Springer, Heidelberg (2001)"},{"key":"15_CR8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","volume":"2","author":"T.Y. Woo","year":"1993","unstructured":"Woo, T.Y., Lam, S.S.: Authorization in distributed systems: A new approach. Journal of Computer Security\u00a02, 107\u2013136 (1993)","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Massacci, F.: Reasoning about security: A logic and a decision method for role-based access control. In: Proceeding of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU\/FAPR 1997), pp. 421\u2013435 (1997)","key":"15_CR9","DOI":"10.1007\/BFb0035639"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems\u00a026, 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1145\/581271.581276","volume":"5","author":"J. Bacon","year":"2002","unstructured":"Bacon, J., Moody, K., Yao, W.: A model of oasis role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC)\u00a05, 492\u2013540 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Transactions on Information and System Security (TISSEC)\u00a06, 71\u2013127 (2003)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"doi-asserted-by":"crossref","unstructured":"Khayat, E.J., Abdallah, A.E.: A formal model for flat role-based access control. In: Proceeding of ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA 2003), Tunis, Tunisia (2003)","key":"15_CR13","DOI":"10.1109\/AICCSA.2003.1227507"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/11560647_25","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2005","author":"C. Zhao","year":"2005","unstructured":"Zhao, C., Heilili, N., Liu, S., Lin, Z.: Representation and reasoning on RBAC: A description logic approach. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.\u00a03722, pp. 381\u2013393. Springer, Heidelberg (2005)"},{"unstructured":"Bechhofer, S., van Harmelen, F., J.H.I.H.D.L.M.L.A.S.: OWL web ontology language reference (2002), \n                    \n                      http:\/\/www.w3.org\/TR\/owl-ref\/","key":"15_CR15"},{"key":"15_CR16","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"F. Baader","year":"2002","unstructured":"Baader, F., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2002)"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/69.567051","volume":"9","author":"E. Bertino","year":"1997","unstructured":"Bertino, E., Samarati, P., Jajodia, S.: An extended authorization model for relational databases. IEEE Transactions on Knowledge and Data Engineering\u00a09, 85\u2013101 (1997)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1145\/168588.168605","volume-title":"Proceedings of the 1st ACM conference on Computer and communications security","author":"E. Bertino","year":"1993","unstructured":"Bertino, E., Pierangela, Samarati, Jajodia, S.: Authorizations in relational database management systems. In: Proceedings of the 1st ACM conference on Computer and communications security, Fairfax, Virginia, United States, pp. 130\u2013139. ACM Press, New York (1993)"},{"doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.A., Sandhu, R.: Rule-based RBAC with negative authorization. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), Tucson, Arizona, USA (2004)","key":"15_CR19","DOI":"10.1109\/CSAC.2004.32"},{"unstructured":"Haarslev, V., Moller, R.: Description of the RACER system and its applications. In: International Workshop on Description Logics (DL 2001), Stanford, USA (2001)","key":"15_CR20"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","first-page":"18","volume-title":"Automated Reasoning","author":"V. Haarslev","year":"2001","unstructured":"Haarslev, V., M\u00f6ller, R.: RACER system description. In: Gor\u00e9, R.P., Leitsch, A., Nipkow, T. (eds.) IJCAR 2001. LNCS, vol.\u00a02083, pp. 18\u201323. Springer, Heidelberg (2001)"},{"key":"15_CR22","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.websem.2003.07.001","volume":"1","author":"I. Horrocks","year":"2003","unstructured":"Horrocks, I., Patel-Schneider, P.F., Harmelen, F.v.: From SHIQ and RDF to OWL: The making of a web ontology language. Jouranl of Web Semantics\u00a01, 7\u201326 (2003)","journal-title":"Jouranl of Web Semantics"},{"unstructured":"Bechhofer, S.: The DIG description logic interface: DIG\/1.1 (2003), Available from: \n                    \n                      http:\/\/dl-web.man.ac.uk\/dig\/2003\/02\/interface.pdf","key":"15_CR23"},{"unstructured":"Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M.: SWRL: A semantic web rule language combining OWL and RuleML (version 0.5) (2003), \n                    \n                      http:\/\/www.daml.org\/2003\/11\/swrl\/","key":"15_CR24"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11811220_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:26:46Z","timestamp":1619494006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11811220_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540370338","9783540370352"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11811220_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}