{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:51:40Z","timestamp":1725490300390},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442226"},{"type":"electronic","value":"9783540457855"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45785-2_14","type":"book-chapter","created":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T12:10:08Z","timestamp":1188216608000},"page":"180-192","source":"Crossref","is-referenced-by-count":2,"title":["A Uniform Model for Authorization and Access Control in Enterprise Information Platform"],"prefix":"10.1007","author":[{"given":"Dongdong","family":"Li","sequence":"first","affiliation":[]},{"given":"Songlin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,2]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Bertino E., Ferrari E. and Atluri V. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems, ACM Transactions on Information Systems Security, February 1999, Vol 1, No. 1","DOI":"10.1145\/300830.300837"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Castano, S., Casati F., and Fugini M. Managing Workflow Authorization Constraints through Active Database Technologh, Information Systems Frontiers, 3(3) September 2001.","DOI":"10.1023\/A:1011461409620"},{"key":"14_CR3","unstructured":"Shengli Wu, Amit Sheth John Miller, Zongwei Luo. Authorization and Access Control of Application Data in Workflow Systems, Intelligent Information Systems, January 2002, pp. 71\u201394"},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, Flexible Support for Multiple Access Control Policies, in ACM Transactions on Database Systems, vol. 26, n. 2, June 2001, pp 214\u2013260","journal-title":"ACM Transactions on Database Systems"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"P. Bonatti, S de Capitani di, P. Samarati, A Modular Approach to Composing Access Control Policies, In Proceedings of the 7th ACM conference on Computer and communications security, page 164\u2013173, Athens Greece, Nov 2000. ACM Press","DOI":"10.1145\/352600.352623"},{"issue":"23","key":"14_CR6","first-page":"107","volume":"2","author":"T.Y.C. Woo","year":"1993","unstructured":"T.Y.C. Woo and S.S. lam, Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2,3): 107\u2013136, 1993","journal-title":"Authorizations in distributed systems: A new approach. Journal of Computer Security"},{"issue":"4","key":"14_CR7","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1145\/503339.503343","volume":"4","author":"P. Samarati","year":"2001","unstructured":"P. Samarati, M.K. Reiter, S. Jajodia, An Authorization Model for a Public Key Management Service, in ACM Transactions on Information and System Security (TISSEC), vol. 4, n. 4, November 2001, pp. 453\u2013482","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"14_CR8","unstructured":"Bertino E., Ferrari E., Administration Policies in a Multipolicy Authorization System. Proc. 11th IFIP Working Conference on Database Security, Lake Tahoe (CA), August 1997, pp. 15\u201326"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"R. Sandhu, E. Coyne, H.L, Feinstein, C.E. Youman, Role-based access control models. IEEE Computer, pages 38\u201347, February 1996","DOI":"10.1109\/2.485845"},{"key":"14_CR10","series-title":"Lect Notes Comput Sci","volume-title":"FC: International Conference on Financial Cryptography","author":"F. Blaze","year":"1998","unstructured":"Blaze, Feigenbaum, Strauss, Compliance checking in the policymaker trust management system. In FC: International Conference on Financial Cryptography. LNCS, Springer-Verlag, 1998"},{"key":"14_CR11","unstructured":"N.H. Minsky, V. Ungureanu, Unified support for heterogeneous security policies in distributed systems. In proceeding of the 7th USENIX Security Symposium (SECURITY-98), pages 131\u2013142, Berkeley, Jan. 26\u201329, 1998. Usenix Association"},{"key":"14_CR12","unstructured":"AHN, GJ, the RCL 2000 Language for Specifying Role_Based Authorization Constraints, PhD Thesis, George Mason University, January 2000"}],"container-title":["Lecture Notes in Computer Science","Engineering and Deployment of Cooperative Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45785-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T18:50:33Z","timestamp":1684003833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45785-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442226","9783540457855"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45785-2_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}