{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:31:57Z","timestamp":1725499917019},"publisher-location":"Boston, MA","reference-count":6,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387754932"},{"type":"electronic","value":"9780387754949"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-75494-9_30","type":"book-chapter","created":{"date-parts":[[2007,12,26]],"date-time":"2007-12-26T20:39:36Z","timestamp":1198701576000},"page":"246-251","source":"Crossref","is-referenced-by-count":1,"title":["An Access Control Model of Workflow System Integrating RBAC and TBAC"],"prefix":"10.1007","author":[{"given":"Xiangning","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Zhaolong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"R.S. Sandhu, E.J. Coyne and H.L. Feinstein, et al. Role Based Access Control Models. IEEE Computer, 29(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"30_CR2","volume-title":"Proc of the 15th IFIP WG 11.3 Working Comference on Database Security","author":"S. Kandala","year":"2002","unstructured":"S. Kandala and R. Sandhu, Secure Role-based workflow Models. Proc of the 15th IFIP WG 11.3 Working Comference on Database Security. Niagara, Ontario, Canda, Kluwer Academic Publishers (2002)."},{"issue":"11","key":"30_CR3","first-page":"1841","volume":"14","author":"X.M. Wang","year":"2003","unstructured":"X.M. Wang, Z.T. Zhao and K.G. Hao, \u201cA Weighted Role and Periodic Time Access Control Model of WorkFlow System\u201d. Journal of Software, 14(11), 1841\u20131848 (2003).","journal-title":"Journal of Software"},{"key":"30_CR4","volume-title":"Proc of the 1992\u20131993 CM SIGSAC New security Paradigms Workshops","author":"R.K. Thomas","year":"1993","unstructured":"R.K. Thomas and R.S. Sandhu, Towards a task-based paradigm for flexible and adaptable access control in distributed applications. Proc of the 1992\u20131993 CM SIGSAC New security Paradigms Workshops. Little Compton, Rhode Island, US: ACM Press (1993)."},{"key":"30_CR5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/CSFW.1994.315946","volume-title":"Proc of the 7th IEEE Computer Security Foundations Workshop","author":"R.K. Thomas","year":"1994","unstructured":"R.K. Thomas and R.S. Sandhu, Conceptual Foundations for a Model of Task-based Authorizations, Proc of the 7th IEEE Computer Security Foundations Workshop. Franconia NH: IEEE Com, 66\u201379 (1994)."},{"issue":"01","key":"30_CR6","first-page":"0076","volume":"14","author":"J.B. Deng","year":"2003","unstructured":"J.B. Deng and F. Hong, \u201cTask-Based Access Control Model\u201d, Journal of Software, 14(01), 0076\u20130082 (2003).","journal-title":"Journal of Software"}],"container-title":["IFIP International Federation for Information Processing","Integration and Innovation Orient to E-Society Volume 2"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-75494-9_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T23:53:12Z","timestamp":1619653992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-75494-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387754932","9780387754949"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-75494-9_30","relation":{},"subject":[]}}