{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:47:43Z","timestamp":1725475663905},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687603"},{"type":"electronic","value":"9783540687610"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11955757_30","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:34:20Z","timestamp":1165829660000},"page":"281-284","source":"Crossref","is-referenced-by-count":2,"title":["Meca: A Tool for Access Control Models"],"prefix":"10.1007","author":[{"given":"Amal","family":"Haddad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Bell, D.E., Lapadula, L.J.: Secure computer systems: A mathematical model. Technical report esd-tr-278, vol. 2, The Mitre Corporation, Bedford (1973)"},{"key":"30_CR2","unstructured":"Biba, K.J.: Integrity considerations for secure computer systems. Technical report tr-3153, The Mitre Corporation, Bedford (1997)"},{"key":"30_CR3","unstructured":"Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference (1992)"},{"key":"30_CR4","unstructured":"Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Science and Systems, pp. 437\u2013443 (1971)"},{"key":"30_CR5","unstructured":"Marlet, R., Mesnil, C.: A demonstrative electronic purse -Card specification, pp. 1\u201353 (2002)"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/3-540-61770-1_28","volume-title":"Computer Security - ESORICS 96","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S.: Role hierarchies and constraints for lattice-bases access controls. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 65\u201379. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","B 2007: Formal Specification and Development in B"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11955757_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:28Z","timestamp":1619508088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11955757_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687603","9783540687610"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11955757_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}