{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:31:44Z","timestamp":1725499904838},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387754932"},{"type":"electronic","value":"9780387754949"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-75494-9_53","type":"book-chapter","created":{"date-parts":[[2007,12,27]],"date-time":"2007-12-27T01:39:36Z","timestamp":1198719576000},"page":"437-444","source":"Crossref","is-referenced-by-count":0,"title":["Role-based Administration of User-role Assignment and Its Oracle Implementation"],"prefix":"10.1007","author":[{"given":"Lilong","family":"Han","sequence":"first","affiliation":[]},{"given":"Qingtan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zongkai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"53_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"R.S. Sandhu, E.J. Coyne, H.L. Feinstein and C.E. Youman, Role-based access control models, IEEE Computer 29(2) (1996), 38\u201347.","journal-title":"IEEE Computer"},{"issue":"8","key":"53_CR2","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/0167-4048(94)90049-3","volume":"13","author":"S.H. Solms von","year":"1994","unstructured":"S.H. von Solms and I. van der Merwe, The management of computer security profiles using a roleoriented approach, Computers & Security 13(8) (1994), 673\u2013680.","journal-title":"Computers & Security"},{"key":"53_CR3","unstructured":"C. Youman, E. Coyne and R. Sandhu, eds, Proceedings of the 1st ACM Workshop on Role-Based Access Control, Nov. 31\u2013Dec. 1, 1995, ACM, 1997."},{"key":"53_CR4","unstructured":"S. Feuerstein, Oracle PL\/SQL Programming, O\u2019Reilly & Associates, Inc., 1995."},{"key":"53_CR5","unstructured":"G. Koch and K. Loney, Oracle The Complete Reference, Oracle Press, 1995."},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"L. Guiri and P. Iglio, A formal model for role-based access control with constraints, in: Proceedings of IEEE Computer Security Foundations Workshop 9, Kenmare, Ireland, June 1996, pp. 136\u2013145.","DOI":"10.1109\/CSFW.1996.503698"},{"key":"53_CR7","doi-asserted-by":"crossref","unstructured":"R. Sandhu, Rationale for the RBAC96 family of access control models, in: Proceedings of the 1st ACM Workshop on Role-Based Access Control, ACM, 1997.","DOI":"10.1145\/270152.270167"},{"issue":"2","key":"53_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"R.S. Sandhu, E.J. Coyne, H.L. Feinstein and C.E. Youman, Role-based access control models, IEEE Computer 29(2) (1996), 38\u201347.","journal-title":"IEEE Computer"},{"key":"53_CR9","unstructured":"C. Youman, E. Coyne and R. Sandhu, eds, Proceedings of the 1st ACM Workshop on Role-Based Access Control, Nov. 31\u2013Dec. 1, 1995, ACM, 1997."},{"issue":"8","key":"53_CR10","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/0167-4048(94)90048-5","volume":"13","author":"I. Mohammed","year":"1994","unstructured":"I. Mohammed and D.M. Dilts, Design for dynamic user-role-based security, Computers & Security 13(8) (1994), 661\u2013671.","journal-title":"Computers & Security"}],"container-title":["IFIP International Federation for Information Processing","Integration and Innovation Orient to E-Society Volume 2"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-75494-9_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T03:53:24Z","timestamp":1619668404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-75494-9_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387754932","9780387754949"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-75494-9_53","relation":{},"subject":[]}}