{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:26Z","timestamp":1725484346720},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_23","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"286-302","source":"Crossref","is-referenced-by-count":1,"title":["Policy Administration Domains"],"prefix":"10.1007","author":[{"given":"M.","family":"Hitchens","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]},{"given":"G.","family":"Saunders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Barkley, J. & Cincotta, A.,\u2019 Managing role\/permission relationships using object access types\u2019, Proceedings of the 3rd ACM workshop on Role-based access control, Fairfax, USA, 1998, pp. 73\u201380.","DOI":"10.1145\/286884.286901"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E. & Sloman, M.,\u2019 The Ponder Policy Specification Language\u2019, Proceedings of International workshop on Policies for Distributed Systems and Networks, Bristol, UK, January, 2001, pp. 18\u201338.","DOI":"10.1007\/3-540-44569-2_2"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Fabry, R.,\u2019 Capability-Based Addressing\u2019, Communications of the ACM, 17(7), July, 1974, pp. 403\u2013412.","DOI":"10.1145\/361011.361070"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Faden. G.,\u2019 RBAC in UNIX administration\u2019, Proceedings of the 4th ACM workshop on role-based access control, Fairfax, USA, 1999, pp. 95\u2013101.","DOI":"10.1145\/319171.319180"},{"key":"23_CR5","unstructured":"Ferraiolo, D., and Kuhn, R.:\u2019 Role based access controls\u2019, Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore MD, USA, 1992, pp. 554\u2013563."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Gavrila, S. & Barkley, J.,\u2019 Formal specification for role based access control user\/role and role\/role relationship management\u2019, Proceedings of the 3rd ACM workshop on Role-based access control, Fairfax, USA, 1998, pp. 81\u201390.","DOI":"10.1145\/286884.286902"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Hitchens, M. & Varadharajan, V.,\u2019 Tower: A Language for Role Based Access Control\u2019, Proceedings of International workshop on Policies for Distributed Systems and Networks, Bristol, UK, January, 2001, pp. 88\u2013106.","DOI":"10.1007\/3-540-44569-2_6"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Kanada, Y.,\u2019 Taxonomy and Description of Policy Combination Methods\u2019, Proceedings of International workshop on Policies for Distributed Systems and Networks, Bristol, UK, January, 2001, pp. 171\u2013184.","DOI":"10.1007\/3-540-44569-2_11"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Marshall, I. & McKee, P.,\u2019 A Policy Based Management Architecture for Large Scale Active Communication Systems\u2019, Proceedings of International workshop on Policies for Distributed Systems and Networks, Bristol, UK, January, 2001, pp. 202\u2013213.","DOI":"10.1007\/3-540-44569-2_13"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"M\u00f6nkeberg, A. & Rakete, R., \u2018Three for one: role-based access-control management in rapidly changing heterogeneous environments\u2019, Proceedings of the 5th ACM workshop on role-based access control, Berlin, Germany, 2000, pp. 83\u201388.","DOI":"10.1145\/344287.344306"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Osborn, S, & Guo, Y., \u2018Modeling users in role-based access control\u2019, Proceedings of the 5th ACM workshop on role-based access control, Berlin, Germany, 2000, pp. 31\u201337.","DOI":"10.1145\/344287.344299"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Sandhu, R. \u2018Lattice based access control models\u2019, Computer, 26(11), November, 1993, pp. 9\u201319.","DOI":"10.1109\/2.241422"},{"issue":"2","key":"23_CR13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., and Feinstein, H.L., \u2018Role based access control models\u2019, IEEE Computer, 1996, 29,(2), pp. 38\u201347.","journal-title":"IEEE Computer"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R. & Munawer, Q., \u2018How to do discretionary access control using roles\u2019, Proceedings of the 3rd ACM workshop on Role-based access control, Fairfax, USA, 1998, pp. 47\u201352.","DOI":"10.1145\/286884.286893"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Sandhu, R. & Munawer, Q.,\u2019 The ARBAC99 Model for Administration of Roles\u2019, Proceedings of 15th Annual Computer Security Applications Conference, Phoenix, USA, 1999","DOI":"10.1109\/CSAC.1999.816032"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Zurko, M., Simon, R., and Sanfilippo, T.:\u2019 A user-centered, modular authorization service built on an RBAC foundation\u2019, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, 1999. pp. 57\u201371.","DOI":"10.1109\/SECPRI.1999.766718"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Perwaiz, N. & Sommerville, I.\u2019 Structured management of role-permission relationships\u2019, Proceedings of the 6th ACM workshop on role-based access control, Chantilly, USA, 2000, pp. 163\u2013169.","DOI":"10.1145\/373256.373292"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T22:43:09Z","timestamp":1683844989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}