{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:25:09Z","timestamp":1725488709788},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540428800"},{"type":"electronic","value":"9783540456001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45600-7_47","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T08:21:49Z","timestamp":1186820509000},"page":"429-440","source":"Crossref","is-referenced-by-count":4,"title":["A Role-Based Model for Access Control in Database Federations"],"prefix":"10.1007","author":[{"given":"Eric","family":"Disson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Danielle","family":"Boulanger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gilles","family":"Dubois","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Dubois G., Boulanger D.: Semantic Cooperation of Legacy Information Systems: an Object-Oriented Framework. Workshop on Database and Expert Systems Applications (DEXA\u201997), Toulouse, France, 1-2 Septembre (1997).","DOI":"10.1109\/DEXA.1997.617336"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Shet A.P., Larson J.A.: Federated Database Systems for Managing Distributed Heterogeneous and Autonomous Databases. ACM Computing Surveys vol.22 n\u00b03, 1990.","DOI":"10.1145\/96602.96604"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Goyal M.L., Singh G.V.: Access Control In Heterogeneous Database Management Systems. Computers and Security, 10(7), North-Holland, 1991.","DOI":"10.1016\/0167-4048(91)90124-V"},{"key":"47_CR4","unstructured":"Jonscher D., Dittrich K.R.: An Approach for Building Secure Database Federations. Int.\u2019l Conf. On Very Large Databases, Santiago, 1994."},{"key":"47_CR5","unstructured":"Olivier M.S.: A Multilevel Secure Federated Database. Database Security VII, North-Holland, 1994."},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Sandhu R. S.: Role Hierarchies and Constraints for Lattice-based Access Controls. Fourth European Symposium on Research in Computer Security, Rome, Italy, 1996.","DOI":"10.1007\/3-540-61770-1_28"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Sandhu R. S., Munawer Q.: How to do Discretionary Access Control Using Roles. ACM Role-Based Access Control Workshop, 1998.","DOI":"10.1145\/286884.286893"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Pernul G.: Canonical Security Modelling for Federated Databases. Interoperable Database Systems, North-Holland, 1993.","DOI":"10.1016\/B978-0-444-89879-1.50018-X"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Tari Z., Fernandez G.: Security Enforcement in the DOK Federated Database System. Database Security X, 1997.","DOI":"10.1007\/978-0-387-35167-4_3"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Castano S., Martella G. and Samarati P.: Analysis, comparison and design of role-based security specifications. Data & Knowledge Engineering 21, 1997.","DOI":"10.1016\/S0169-023X(96)00025-0"},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Boulanger D., Dubois G.: An Object Approach for Information System Cooperation. Information Systems vol. 23, n\u00b06, 1998.","DOI":"10.1016\/S0306-4379(98)00019-2"},{"key":"47_CR12","unstructured":"Boulanger D., Disson E., Dubois G.: Object-Oriented Metadata for Secured Cooperation of Legacy Information Systems. International Workshop on Model engineering IWME\u201900, Sophia-Antipolis and Cannes, France, 12-16th June 2000."},{"key":"47_CR13","unstructured":"Disson E.: A Role-based Access Model for Federated Databases Security. Poster session ESORICS 2000, Toulouse, 4-6th October 2000."},{"key":"47_CR14","unstructured":"Nyanchama M., Osborn S.: Modeling mandatory access control in role-based security systems. Database Security VIII: Status and Prospects. Chapman-Hall, 1996."},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E.: Role-Based Access Control Model. IEEE Computer, Vol 29, n\u00b02, 1996.","DOI":"10.1109\/2.485845"},{"key":"47_CR16","unstructured":"Lampson B.W.: Protection. Princeton Symposium of Information Science and Systems. 1971."},{"key":"47_CR17","series-title":"Technical Report","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","volume-title":"Secure Computer System: Unified Exposition and Multics Interpretation","author":"D.E. Bell","year":"1976","unstructured":"Bell D.E., LaPadula L.J.: Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE Corp., Bedford, Mass, 1976."},{"key":"47_CR18","unstructured":"OMG, Unified Modeling Language Specification, version 1.3, March 2000."},{"key":"47_CR19","doi-asserted-by":"crossref","unstructured":"Jajodia S., Kogan B.: Integrating an object-oriented data model with multi-level security. IEE Symposium on Security and Privacy, 1990.","DOI":"10.21236\/ADA224491"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Millen J.K., Lunt T.F.: Security for Object-Oriented Database Systems. IEEE Symposium on Research in Security and Privacy, 1992.","DOI":"10.1109\/RISP.1992.213255"},{"key":"47_CR21","unstructured":"Keefe T., Tsai W.: Prototyping the SODA Security Model. Database Security III: Status and Prospects, North-Holland, 1990."},{"key":"47_CR22","unstructured":"Lunt T.F.: Multilevel Security for Object-Oriented Database Systems. Database Security III: Status and Prospects, North-Holland, 1990."},{"key":"47_CR23","unstructured":"Denning D.E.: Secure distributed data views: the Sea View formal security model. Technical Report A003 SRI International, 1987."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45600-7_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:20:14Z","timestamp":1556738414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45600-7_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540428800","9783540456001"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-45600-7_47","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}