{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:32:38Z","timestamp":1725471158385},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540386193"},{"type":"electronic","value":"9783540386223"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839569_34","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T13:21:24Z","timestamp":1159881684000},"page":"352-361","source":"Crossref","is-referenced-by-count":0,"title":["An Approach for Trusted Interoperation in a Multidomain Environment"],"prefix":"10.1007","author":[{"given":"Yuqing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Peng","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Xiangxu","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","volume":"28","author":"S. Oh","year":"2003","unstructured":"Oh, S., Park, S.: Task-role-based Access Control Model. J. of Information System\u00a028, 533\u2013562 (2003)","journal-title":"J. of Information System"},{"issue":"3","key":"34_CR2","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A.: TRBAC: A Temporal Role-Based Access Control Model. ACM Transaction on Information and System Security\u00a04(3), 191\u2013223 (2001)","journal-title":"ACM Transaction on Information and System Security"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J.B.D. Joshi","year":"2005","unstructured":"Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: Generalized Temporal Role Based Access Control Model (GTRBAC). IEEE Transaction on Knowledge and Data Engineering\u00a017, 4\u201323 (2005)","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"issue":"1","key":"34_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/32.481533","volume":"22","author":"L. Gong","year":"1996","unstructured":"Gong, L., Qian, X.: Computational Issues in Secure Interoperation. IEEE Transaction on Software Engineering\u00a022(1), 43\u201352 (1996)","journal-title":"IEEE Transaction on Software Engineering"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Di Vimercati, S.D.C., Samarati, P.: A Modular Approach to Composing Access Control Policies. In: 7th ACM Conference on Communications and Security, pp. 164\u2013173 (2000)","DOI":"10.1145\/352600.352623"},{"issue":"2","key":"34_CR6","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/762476.762481","volume":"6","author":"D. Wijesekera","year":"2003","unstructured":"Wijesekera, D., Jajodia, S.: A Propositional Policy Algebra for Access Control. ACM Transaction on Information and System Security\u00a06(2), 286\u2013325 (2003)","journal-title":"ACM Transaction on Information and System Security"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Biskup, J., Wortmann, S.: Towards a Credential-Based Implementation of Compound Access Control Policies. In: Proc. of ACM SACMAT 2004, pp. 31\u201340 (2004)","DOI":"10.1145\/990036.990042"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Song, E., Reddy, R., France, R., Ray, I., Georg, G., A., R.: Verifiable Composition of Access Control and Application Features. In: Proc. of SACMAT 2005, Stockholm, pp. 120\u2013129 (2005)","DOI":"10.1145\/1063979.1064001"},{"issue":"11","key":"34_CR9","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/TKDE.2005.185","volume":"17","author":"B. Shafiq","year":"2005","unstructured":"Shafiq, B., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Transaction on Knowledge and Data Engineering\u00a017(11), 1557\u20131577 (2005)","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Gavrila, S., Hu, V., Kuhn, R., D.: Composing and Combining Policies under the Policy Machine. In: Proc. of ACM SACMAT 2005, Stockholm, pp. 11\u201320 (2005)","DOI":"10.1145\/1063979.1063982"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Park, J.S., Costello, K.P., Neven, T.M., Diosomito, J.A.: A Composite RBAC Approach for Large, Complex Organization. In: Proc. of ACM SACMAT 2004, pp. 163\u2013171 (2004)","DOI":"10.1145\/990036.990063"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/11686699_53","volume-title":"Computer Supported Cooperative Work in Design II","author":"Y.Q. Sun","year":"2006","unstructured":"Sun, Y.Q., Meng, X.X., Liu, S.J., Pan, P.: Flexible Workflow Incorporated with RBAC. In: Shen, W.-m., Chao, K.-M., Lin, Z., Barth\u00e8s, J.-P.A., James, A. (eds.) CSCWD 2005. LNCS, vol.\u00a03865, pp. 525\u2013534. Springer, Heidelberg (2006)"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Sun, Y.Q., Pan, P.: PRES\u2014A Practical Flexible RBAC Workflow System. In: Proc. of 7th International Conference on Electronic Commerce, pp. 653\u2013658 (2005)","DOI":"10.1145\/1089551.1089668"},{"issue":"2","key":"34_CR14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Rose-Based Access Control Model. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839569_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:20:30Z","timestamp":1605644430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839569_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540386193","9783540386223"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11839569_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}