{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:51:30Z","timestamp":1725490290584},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442226"},{"type":"electronic","value":"9783540457855"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45785-2_37","type":"book-chapter","created":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T16:10:08Z","timestamp":1188231008000},"page":"466-477","source":"Crossref","is-referenced-by-count":0,"title":["An RBAC Based Policy Enforcement Coordination Model in Internet Environment"],"prefix":"10.1007","author":[{"given":"Yaying","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jinyuan","family":"You","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,2]]},"reference":[{"issue":"2","key":"37_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/129630.129635","volume":"35","author":"D. Gelernter","year":"1992","unstructured":"D. Gelernter, N. Carriero, Coordination languages and their significance, Communication of the ACM, 1992, 35(2): 97\u2013107.","journal-title":"Communication of the ACM"},{"issue":"1","key":"37_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/174666.174668","volume":"26","author":"T. W. Malone","year":"1994","unstructured":"T. W. Malone and K. Crowston, The Interdisciplinary Study of Coordination, ACM Computing Surveys, 1994, 26(1):87\u2013119.","journal-title":"ACM Computing Surveys"},{"doi-asserted-by":"crossref","unstructured":"M. Cremonini, A. Omicini, F. Zambonelli, Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach, Proceedings of 4th International Conference (COORDINATION 2000) on Coordination Languages and Model, 2000:99\u2013114.","key":"37_CR3","DOI":"10.1007\/3-540-45263-X_7"},{"unstructured":"David Ferraiolo, Richard Kuhn, Role based access control, Proceedings of 15th NIST-NCSC National Computer Security Conference, 1992:554\u2013563.","key":"37_CR4"},{"issue":"2","key":"37_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S1363-4127(01)00204-7","volume":"6","author":"B. Carlo","year":"2001","unstructured":"Bellettini Carlo, Bertino Elisa, Ferrari Elena, Role Based Access Control Models. Information Security Technical Report, 2001, 6(2): 21\u201329.","journal-title":"Information Security Technical Report"},{"issue":"17","key":"37_CR6","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1016\/S0140-3664(00)00244-9","volume":"23","author":"A. Lin","year":"2000","unstructured":"A. Lin, R. Brown, The application of security policy to role-based access control and the common data security architecture, Computer Communication, 23(17), 2000: 1584\u20131593.","journal-title":"Computer Communication"},{"issue":"4","key":"37_CR7","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1145\/63334.63337","volume":"32","author":"N. Carriero","year":"1989","unstructured":"N Carriero and D Gelernter. Linda in Context. Communications of the ACM, 1989, 32(4): 444\u2013458.","journal-title":"Communications of the ACM"},{"unstructured":"Carolton McDonald, Masoud Yazdani. Prolog programming-a tutorial introduction. Oxford, 1990.","key":"37_CR8"},{"issue":"1","key":"37_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1080\/08839510150204590","volume":"15","author":"N. H. Minsky","year":"2001","unstructured":"Naftaly H. Minsky, Yaron M. Minsky, Victoria Ungureanu, Safe Tuplespace-Based Coordination in Multi-Agent Systems, Jounal of Applied Artificial Intelligence, 2001, 15(1): 11\u201333.","journal-title":"Jounal of Applied Artificial Intelligence"},{"issue":"3","key":"37_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1145\/352591.352592","volume":"9","author":"N. H. Minsky","year":"2000","unstructured":"Naftaly H. Minsky, Victoria Ungureanu, Law-Governed Interaction: a Coordination and Control Mechanism for Heterogeneous Distributed Systems, ACM Transaction On Software Engineering and Methodology, 2000, 9(3): 273\u2013305.","journal-title":"ACM Transaction On Software Engineering and Methodology"},{"key":"37_CR11","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S0065-2458(08)60208-9","volume":"46","author":"G. A. Papadopoulos","year":"1998","unstructured":"G. A. Papadopoulos, F. Arbab, Coordination Models and Languages, Advances in Computers, 46(The Engineering of Large Systems), 1998: 329\u2013400.","journal-title":"Advances in Computers"},{"doi-asserted-by":"crossref","unstructured":"Davide Rossi, Giacomo Cabri, Enrico Denti, Tuple-based technologies for coordination, In A. Omicini, F. Zambonelli, M. Klusch, R. Toldsdorf(Eds.), Coordination of Internet Agents, Springer, 2001:83\u2013109.","key":"37_CR12","DOI":"10.1007\/978-3-662-04401-8_4"},{"key":"37_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Coordination Models and Languages, 5th International Conference, COORDINATION 2002","year":"2002","unstructured":"Farhad Arbab, Carolyn L. Talcott (Eds.): Coordination Models and Languages, 5th International Conference, COORDINATION 2002, Lecture Notes in Computer Science, Vol. 2315, Berlin Heidelberg New York (2002)."},{"issue":"2","key":"37_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/5254.757630","volume":"14","author":"N. Jamali","year":"1999","unstructured":"Nadeem Jamali, Prasannaa Thati, Gul A. Agha, An Actor-based Architecture for Customizing and Controlling Agent Ensembles, IEEE Intelligent Systems, 1999, 14(2):38\u201344.","journal-title":"IEEE Intelligent Systems"}],"container-title":["Lecture Notes in Computer Science","Engineering and Deployment of Cooperative Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45785-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T16:37:44Z","timestamp":1556815064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45785-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442226","9783540457855"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45785-2_37","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}