{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T22:40:20Z","timestamp":1736635220172,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540386193"},{"type":"electronic","value":"9783540386223"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839569_42","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T13:21:24Z","timestamp":1159881684000},"page":"439-448","source":"Crossref","is-referenced-by-count":0,"title":["An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment"],"prefix":"10.1007","author":[{"given":"Hong","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Sujuan","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"L\u00fc","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Basit, S., James, B.D., Joshi, M., Elisa, B., Arif, G.: Secure Interoperation in a Multi-domain Environment Employing RBAC Policies. IEEE Transactions on knowledge and data engineering\u00a017(11) (November 2005)","DOI":"10.1109\/TKDE.2005.185"},{"key":"42_CR2","unstructured":"Franco, A., Fabio, F., Enrico, N., Maurizio, T.: A Layered IT Infrastructure for Secure Interoperability in Personal Data Registry Digital Government Services. In: Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE 2004), pp. 95\u2013102 (2004)"},{"key":"42_CR3","first-page":"411","volume-title":"Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS)","author":"E. Freudenthal","year":"2002","unstructured":"Freudenthal, E., Pesin, T., Port, L., Keenan, E., et al.: dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. In: Edward, K. (ed.) Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, pp. 411\u2013420. IEEE Computer Society, Los Alamitos (2002)"},{"issue":"2","key":"42_CR4","first-page":"173","volume":"3","author":"A. Jalal","year":"2001","unstructured":"Jalal, A., Apu, K., Roy, C., Dennis, M.: The A - IRBAC2000 Model: Administrative Interoperable Role-Base Access Control. ACM Transactions on Informatin and Systems Security\u00a03(2), 173\u2013182 (2001)","journal-title":"ACM Transactions on Informatin and Systems Security"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Park, J.S., Keith, P.C., Teresa, M.N., Josh, A.D.: A composite rbac approach for large, complex organizations. In: ACM Symposium on Access Control Models and Technologies, pp. 163\u2013172 (2004)","DOI":"10.1145\/990036.990063"},{"key":"42_CR6","unstructured":"Kapadia, A., Muhtadi, J.A., Campbell, R.H., et al.: IRBAC 2000: Secure Interoperability Using Dynamic Role Translation. In: Proceedings of The 1st International Conference on Internet Computing (IC 2000), Las Vegas, Nevada, June 2000, pp. 231\u2013238 (2000)"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Mohamed, S., Elisa, B., Arif, G.: SERAT: SEcure role mApping technique for decentra-lized secure interoperability. In: Proceedings of the tenth ACM symposium on Access control models and technologies, June 2005, pp. 159\u2013167 (2005)","DOI":"10.1145\/1063979.1064007"},{"issue":"2","key":"42_CR8","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"S. Ravi","year":"1996","unstructured":"Ravi, S., Edward, C., Hal, F., et al.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"1","key":"42_CR9","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"S. Ravi","year":"1999","unstructured":"Ravi, S., Venkata, B., Qamar, M.: The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and System Security\u00a02(1), 105\u2013135 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"42_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-540-30555-2_43","volume-title":"Distributed Computing and Internet Technology","author":"A. Vijayalakshmi","year":"2004","unstructured":"Vijayalakshmi, A., Janice, W.: Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. In: Ghosh, R.K., Mohanty, H. (eds.) ICDCIT 2004. LNCS, vol.\u00a03347, pp. 369\u2013378. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839569_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T03:10:13Z","timestamp":1736565013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839569_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540386193","9783540386223"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11839569_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}