{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:56Z","timestamp":1761611216177},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540418641"},{"type":"electronic","value":"9783540453154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45315-6_19","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T01:28:39Z","timestamp":1196645319000},"page":"287-302","source":"Crossref","is-referenced-by-count":10,"title":["Foundations for a Graph-Based Approach to the Specification of Access Control Policies"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Koch","sequence":"first","affiliation":[]},{"given":"Luigi Vincenzo","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Parisi-Presicce","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,3,23]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"P. Bonatti, S. De Capitani di Vimercati, and P. Samarati. A modular approach to composing access control policies. In Proc. of the 7th ACM Conference on Computer and Communication Security. ACM, November 2000.","key":"19_CR1","DOI":"10.1145\/352600.352623"},{"key":"19_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/3-540-61228-9_79","volume-title":"5th Int. Workshop on Graph Grammars and their Application to Computer Science","author":"A. Corradini","year":"1996","unstructured":"A. Corradini, H. Ehrig, M. Lowe, and J. Padberg. The category of typed graph grammars and their adjunction with categories of derivations. In 5th Int. Workshop on Graph Grammars and their Application to Computer Science, number 1073 in LNCS, pages 56\u201374. Springer, 1996."},{"doi-asserted-by":"crossref","unstructured":"H. Ehrig, R. Heckel, M. Korff, M. Lowe, L. Ribeiro, A. Wagner, and A. Corradini. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. I: Foundations, chapter Algebraic Approaches to Graph Transformation Part II: Single Pushout Approach and Comparison with Double Pushout Approach. In Rozenberg [Roz97], 1997.","key":"19_CR3","DOI":"10.1142\/9789812384720_0004"},{"key":"19_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/BFb0055805","volume-title":"Proc. of MFCS\u201998","author":"M. Gro\u00dfe-Rhode","year":"1998","unstructured":"M. Gro\u00dfe-Rhode, F. Parisi-Presicce, and M. Simeoni. Spatial and Temporal Refinement of Typed Graph Transformation Systems. In Proc. of MFCS\u201998, number 1450 in LNCS, pages 553\u2013561. Springer, 1998."},{"doi-asserted-by":"crossref","unstructured":"R. Heckel and A. Wagner. Ensuring consistency of conditional graph grammars-a constructive approach. In Proc. SEGRAGRA\u201995 Graph Rewriting and Computation, number 2. Electronic Notes of TCS, 1995. http:\/\/www.elsevier.nl\/locate\/entcs\/volume2.html .","key":"19_CR5","DOI":"10.1016\/S1571-0661(05)80188-4"},{"doi-asserted-by":"crossref","unstructured":"M. Koch, L. V. Mancini, and F. Parisi-Presicce. On the specification and evolution of access control policies. Technical Report SI-2000\/05, Dip.Scienze dell\u2019Informazione, Uni. Roma La Sapienza, May 2000.","key":"19_CR6","DOI":"10.1145\/373256.373280"},{"key":"19_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/10722599_8","volume-title":"Proc. of the 6th European Symposium on Research in Computer Security (ESORICS 2000)","author":"M. Koch","year":"2000","unstructured":"M. Koch, L.V. Mancini, and F. Parisi-Presicce. A Formal Model for Role-Based Access Control using Graph Transformation. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proc. of the 6th European Symposium on Research in Computer Security (ESORICS 2000), number 1895 in LNCS, pages 122\u2013139. Springer, 2000."},{"key":"19_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1007\/3-540-18771-5_72","volume-title":"Int. Workshop on Graph Grammars and their Application to Computer Science","author":"F. Parisi-Presicce","year":"1987","unstructured":"F. Parisi-Presicce, H. Ehrig, and U. Montanari. Graph Rewriting with unification and composition. In H. Ehrig, M. Nagl, G. Rozenberg, and A. Rosenfeld, editors, Int. Workshop on Graph Grammars and their Application to Computer Science, number 291 in LNCS, pages 496\u2013524. Springer, 1987."},{"doi-asserted-by":"crossref","unstructured":"G. Rozenberg, editor. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. I: Foundations. World Scientific, 1997.","key":"19_CR9","DOI":"10.1142\/3303"},{"issue":"11","key":"19_CR10","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R. S. Sandhu","year":"1993","unstructured":"R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9\u201319, 1993.","journal-title":"IEEE Computer"},{"doi-asserted-by":"crossref","unstructured":"R. S. Sandhu. Role-Based Access Control. In Advances in Computers, volume 46. Academic Press, 1998.","key":"19_CR11","DOI":"10.1016\/S0065-2458(08)60206-5"},{"doi-asserted-by":"crossref","unstructured":"R.S. Sandhu and P. Samarati. Access Control: Principles and Practice. IEEE Communication Magazine, pages 40\u201348, 1994.","key":"19_CR12","DOI":"10.1109\/35.312842"}],"container-title":["Lecture Notes in Computer Science","Foundations of Software Science and Computation Structures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45315-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T09:09:57Z","timestamp":1557047397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45315-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540418641","9783540453154"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45315-6_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}