{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:43:15Z","timestamp":1755034995012},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540409298"},{"type":"electronic","value":"9783540409328"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11861201_68","type":"book-chapter","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T02:00:39Z","timestamp":1161136839000},"page":"588-594","source":"Crossref","is-referenced-by-count":2,"title":["Cellular Automata Based Role-Delegation in RBAC"],"prefix":"10.1007","author":[{"given":"Jun-Cheol","family":"Jeon","sequence":"first","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","volume-title":"The theory of self-reproducing automata","author":"J. Neumann Von","year":"1966","unstructured":"Von Neumann, J.: The theory of self-reproducing automata. University of Illinois Press, Urbana, London (1966)"},{"key":"68_CR2","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1111\/j.0824-7935.2004.00248.x","volume":"20","author":"J.C. Jeon","year":"2004","unstructured":"Jeon, J.C., Yoo, K.Y.: Design of Montgomery Multiplication Architecture based on Programmable Cellular Automata. Computational intelligence\u00a020, 495\u2013502 (2004)","journal-title":"Computational intelligence"},{"key":"68_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-30141-7_58","volume-title":"Network and Parallel Computing","author":"M. Seredynski","year":"2004","unstructured":"Seredynski, M., Pienkosz, K., Bouvry, P.: Reversible Cellular Automata Based Encryption. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol.\u00a03222, pp. 411\u2013418. Springer, Heidelberg (2004)"},{"key":"68_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/978-3-540-30479-1_84","volume-title":"Cellular Automata","author":"S. Das","year":"2004","unstructured":"Das, S., Sikdar, B.K., Pal Chaudhuri, P.: Charaterization of Reachable\/Nonreachable Cellular Automata States. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 813\u2013822. Springer, Heidelberg (2004)"},{"key":"68_CR5","doi-asserted-by":"crossref","unstructured":"Chen, F., Sandhu, R.: Constraints for RBAC. In: 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, pp. 39\u201346 (1995)","DOI":"10.1145\/270152.270177"},{"key":"68_CR6","unstructured":"Ahn, G.: RCL 2000, ph.d dissertation, George Mason University (2000)"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Barka, E., Sandhu, R.: Framework for Role-Based Delegation Models. In: 16th Annual Computer Security Applications Conference, New Orleans, Louisiana (2000)","DOI":"10.1109\/ACSAC.2000.898870"},{"key":"68_CR8","unstructured":"Longhua, Z., Ahn, G., Chu, B.: A Rule-based Framework for Role-Based Delegation. In: ACM SACMAT, Chantilly, VA, USA (2001)"},{"key":"68_CR9","unstructured":"Ferraiolo, D., Kuhu, R., Chandramouli, R.: Role-Based Access Control, Artech house (2003)"},{"key":"68_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4365-7","volume-title":"Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption, and Modeling","author":"O. Lafe","year":"2000","unstructured":"Lafe, O.: Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption, and Modeling. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"68_CR11","volume-title":"Additive Cellular Automata Theory and Applications","author":"P.P. Chaudhuri","year":"1997","unstructured":"Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata Theory and Applications, vol.\u00a01. IEEE Computer Society Press, Los Alamitos (1997)"}],"container-title":["Lecture Notes in Computer Science","Cellular Automata"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11861201_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T17:45:21Z","timestamp":1555868721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11861201_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540409298","9783540409328"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11861201_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}