{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:14Z","timestamp":1725494474463},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540421306"},{"type":"electronic","value":"9783540451440"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45144-7_10","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T20:12:14Z","timestamp":1194984734000},"page":"90-104","source":"Crossref","is-referenced-by-count":4,"title":["Modelling Security Policies in Hypermedia and Web- Based Applications"],"prefix":"10.1007","author":[{"given":"Paloma","family":"D\u00edaz","sequence":"first","affiliation":[]},{"given":"Ignacio","family":"Aedo","sequence":"additional","affiliation":[]},{"given":"Fivos","family":"Panetsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,2]]},"reference":[{"key":"10_CR1","unstructured":"Commercial Computer Security Centre Security Functionality Manual, Department of Trade and Industry, V21-Version 3.0. February (1989)"},{"key":"10_CR2","first-page":"413","volume":"10","author":"R. Sandhu","year":"1991","unstructured":"Sandhu, R. and Jajodia, S.: Integrity principles and mechanisms in Database management systems. Computer&Security, 10, (1991) 413\u2013427.","journal-title":"Computer&Security"},{"key":"10_CR3","unstructured":"Sandhu, R.S.: Lattice-Based Access Control Models. IEEE Computer, November, (1993) 9\u201319."},{"key":"10_CR4","unstructured":"Brinkley, D.L. and Schell, R.R.: Concepts and Terminology for Computer Security. In \u201cInformation Security. A collection of essays\u201d Ed. Abrams. M.D., Jajodia, S. and Podell, H.J. IEEE Computer Society Press (1995) 40\u201397."},{"issue":"2","key":"10_CR5","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Shandu","year":"1996","unstructured":"Shandu, R.S., Coyne, E.J., Feinstein, H.L. and Youman, C.E.: Role-Based Access Control Models. IEEE Computer, 29(2), February (1996) 38\u201347.","journal-title":"IEEE Computer"},{"key":"10_CR6","unstructured":"Murugesan, S., Deshpande, Y., Hansen, S. and Ginige, A.: Web Engineering: A New Discipline for Development of web-based Systems. Proceedings of the First ICSE Workshop on Web-Engineering (\n                    http:\/\/listserv.macarthur.uws.edu.au\/san\/icse99-WebE-Proc\/default.htm\n                    \n                  ), (1999)"},{"key":"10_CR7","unstructured":"Lowe, D. and Hall, W. Hypermedia and the web: an engineering approach. John Wiley & Sons. (1999)"},{"key":"10_CR8","unstructured":"Fern\u00e1ndez, E. B., Krishnakumar, R.N., Larrondo-Petrie, M.M. and Xu, Y.: High-level Security Issues in Multimedia\/Hypertext Systems. Communications and Multimedia Security II. P. Horster (ed.), Chapman & Hall. (1996) 13\u201324."},{"key":"10_CR9","unstructured":"D\u00ecaz, P., Aedo, I., Panetsos, F. and Ribagorda, A.: A security model for the design of hypermedia systems. Proc. of the 14th Information Security Conference SEC98. Vienna and Budapest. (1998) 251\u2013260."},{"issue":"5","key":"10_CR10","first-page":"236","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM, 19 (5) (1976) 236\u2013243.","journal-title":"A Lattice Model of Secure Information Flow"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Clark, D.D. and Wilson, D.R.: A Comparison of Commercial an Military Computer Security Policies. Proceedings of the Symposium on Security and Privacy (1987) 184\u2013194.","DOI":"10.1109\/SP.1987.10001"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/306686.306687","volume":"17","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Jajodia, S. and Samarati, P.: A Flexible Authorization Model for Relational Data Management Systems. ACM Trans. of Information Systems, 17 (2), April (1999) 101\u2013140.","journal-title":"ACM Trans. of Information Systems"},{"key":"10_CR13","unstructured":"Bell, D.E. and LaPadula, L.J.: \u201cSecure Computer Systems: Mathematical Foundations and Model\u201d. Mitre Corp. Report No. M74-244, Bedford, Mass (1975)"},{"key":"10_CR14","unstructured":"Biba, K.J.: \u201cIntegrity Considerations for Secure Computer Systems\u201d. Mitre Corp. Report TR-3153, Bedford, Mass (1977)"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/0378-7206(94)00028-H","volume":"28","author":"B. Thuraisingham","year":"1995","unstructured":"Thuraisingham, B.: Multilevel security for information retrieval systems-II. Information and Management, 28, (1995) 49\u201361.","journal-title":"Information and Management"},{"key":"10_CR16","unstructured":"D\u00ecaz, P., Aedo, I. and Panetsos, F. Modeling the dynamic behavior of hypermedia applications. IEEE Transactions on Software Engineering (forthcoming)."},{"key":"10_CR17","first-page":"417","volume-title":"Proceedings Spring Join Comp. Conference","author":"G.S. Graham","year":"1972","unstructured":"Graham, G.S. and Denning, P.:Protection-Principles and Practice, Proceedings Spring Join Comp. Conference, 40, AFIPS Press, Montvale, N.J. (1972) 417\u2013429."},{"key":"10_CR18","unstructured":"D\u00ecaz, P., Aedo, I. and Panetsos, F.: Definition of integrity policies for web-based applications. In \u201cIntegrity and Internal Control in Information Systems Strategic Views on the Need for Control\u201d. Eds. Margaret E. van Biene-Hershey and Leon A.M. Strous. Kluwer Academic Publishers. (2000) 85\u201398."},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/93.295268","volume":"1","author":"B. Furht","year":"1994","unstructured":"Furht, B.: Multimedia Systems: an overwiev. IEEE Multimedia, 1(1), 47\u201359, 1994.","journal-title":"IEEE Multimedia"},{"key":"10_CR20","volume-title":"Multimedia and hypertext: the Internet and beyond","author":"J. Nielsen","year":"1995","unstructured":"Nielsen, J.: Multimedia and hypertext: the Internet and beyond. Academic Press Professional, Boston, (1995)"},{"issue":"1","key":"10_CR21","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/64789.64993","volume":"7","author":"F. Tompa","year":"1989","unstructured":"Tompa, F.: A Data Model for Flexible Hypertext Database Systems ACM Transactions on Information Systems, 7 (1).(1989) 85\u2013100.","journal-title":"ACM Transactions on Information Systems"},{"key":"10_CR22","unstructured":"Halasz, F. G. and Schwartz, M.: The Dexter Hypertext Reference Model. Proc. of World Conference of Hypertext, (1990) 95\u2013133."},{"issue":"1","key":"10_CR23","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/09558543.1993.12031214","volume":"5","author":"L. Hardman","year":"1993","unstructured":"Hardman, L., Bulterman, D. and Van Rossum, G.: The Amsterdam Hypermedia Model: Extending Hypertext to support Real Multimedia. Hypermedia 5 (1) (1993) 47\u201369.","journal-title":"The Amsterdam Hypermedia Model: Extending Hypertext to support Real Multimedia"},{"issue":"7","key":"10_CR24","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1145\/48511.48515","volume":"31","author":"B. Campbell","year":"1988","unstructured":"Campbell, B. and Goodman, J. M.: HAM: A general purpose hypertext abstract Machine\u2019 Communications of the ACM 31 (7) (1988) 856\u2013861.","journal-title":"Communications of the ACM"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Stotts P. D. and Furuta R.: Petri-Net-Based Hypertext: Document Structure with Browsing Semantics. ACM Transactions on Office Information Systems, 7(1). (1989).","DOI":"10.1145\/64789.64791"},{"key":"10_CR26","unstructured":"Lange, D B \u2018A Formal Model of Hypertext\u2019 Proceedings of the Hypertext Standardization Workshop, Judi Moline, Dan Beningni and Jean Baronas Eds. (1990) 145\u2013166."},{"issue":"1","key":"10_CR27","first-page":"1","volume":"6","author":"D. Merkl","year":"1994","unstructured":"Merkl, D. and Pernul, G.: Security for next generation hypertext systems. Hypermedia. 6 (1) (1994) 1\u201319.","journal-title":"Security for next generation hypertext systems"},{"issue":"4","key":"10_CR28","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/69.536249","volume":"8","author":"P. Samarati","year":"1996","unstructured":"Samarati, P., Bertino, E. and Jajodia, S.: An Authorization Model for a Distributed Hypertext System. IEEE Transactions on Knowledge and Data Engineering, 8 (4), (1996) 555\u2013562.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"8","key":"10_CR29","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S0306-4379(97)00028-8","volume":"22","author":"P. D\u00ecaz","year":"1997","unstructured":"D\u00ecaz, P., Aedo, I. and Panetsos, F.: Labyrinth, an abstract model for hypermedia applications. Description of its static components. Information Systems, 22 (8) (1997) 447\u2013464.","journal-title":"Information Systems"},{"key":"10_CR30","unstructured":"D\u00ecaz, P., Aedo, I. and Panetsos, F. A methodological framework for the conceptual design of hypermedia systems. Proc. of the Fifth Conference on \u201cHypertexts and Hypermedia: Products, Tools and Methods\u201d (H2PTM 99). Paris, September, (1999) 213\u2013228."}],"container-title":["Lecture Notes in Computer Science","Web Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45144-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T08:07:02Z","timestamp":1551082022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45144-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540421306","9783540451440"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-45144-7_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}