{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:14:19Z","timestamp":1743012859658,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":23,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_664","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:52:21Z","timestamp":1319723541000},"page":"1368-1371","source":"Crossref","is-referenced-by-count":0,"title":["Web Access Control Strategies"],"prefix":"10.1007","author":[{"given":"Alban","family":"Gabillon","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"664_CR1_664","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"MA Harrison","year":"1976","unstructured":"Harrison MA, Ruzzo WL, Ullman JD (1976) Protection in operating systems. Commun ACM 19(8):461\u2013471","journal-title":"Commun ACM"},{"key":"664_CR2_664","doi-asserted-by":"crossref","unstructured":"Bell D, La Padula L (1975) Secure computer systems: unified exposition and multics interpretation. Technical report ESD-TR-75-306, MTR-2997, MITRE, Bedford","DOI":"10.21236\/ADA023588"},{"key":"664_CR3_664","unstructured":"Biba K (1976) Integrity considerations for computer systems. Technical report ESD-TR-76-372, MITRE, Bedford"},{"key":"664_CR4_664","unstructured":"Ferraiolo DF, Kuhn DR (1992) Role based access controls. In: 15th national computer security conference, pp 554\u2013563"},{"issue":"3","key":"664_CR5_664","first-page":"222","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Sec 4(3):222\u2013274","journal-title":"ACM Trans Inf Syst Sec"},{"issue":"1","key":"664_CR6_664","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R Sandhu","year":"1999","unstructured":"Sandhu R, Bhamidipati V, Munawer Q (1999) The ARBAC97 model for role-based administration of roles. ACM Trans Inf Syst Sec 2(1):105\u2013135","journal-title":"ACM Trans Inf Syst Sec"},{"key":"664_CR7_664","doi-asserted-by":"crossref","unstructured":"Yuan E, Tong J (2005) Attributed Based Access Control (ABAC) for web services. In: Proceedings of the IEEE international conference on web services (ICWS\u201905). IEEE Computer Society, Washington, pp 561\u2013569","DOI":"10.1109\/ICWS.2005.25"},{"key":"664_CR8_664","doi-asserted-by":"crossref","unstructured":"Bertino E, Catania E, Damiani M, Persasca P (2005) GEO-RBAC: a spatially aware RBAC. In: 10th ACM symposium on access control models and technologies (SACMAT), Stockholm, pp\u00a029\u201337","DOI":"10.1145\/1063979.1063985"},{"issue":"1","key":"664_CR9_664","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"JBD Joshi","year":"2005","unstructured":"Joshi JBD, Bertino E, Latif U, Ghafoor A (2005) Generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4\u201323","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"664_CR10_664","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F Cuppens","year":"2008","unstructured":"Cuppens F, Cuppens-Boulahia N (2008) Modeling contextual security policies. Int J Inf Sec (IJIS) 7(4):285\u2013305","journal-title":"Int J Inf Sec (IJIS)"},{"issue":"2","key":"664_CR11_664","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S Jajodia","year":"2001","unstructured":"Jajodia S, Samarati P, Sapino ML, Subrahmanian VS (2001) Flexible support for multiple access control policies. ACM Trans Database Syst 26(2):214\u2013260","journal-title":"ACM Trans Database Syst"},{"key":"664_CR12_664","unstructured":"XACML. \n                  http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"key":"664_CR13_664","doi-asserted-by":"crossref","unstructured":"Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati\u00a0P (2000) Securing XML documents. In: Proceedings of the 2000 international conference on extending database technology (EDBT2000), Konstanz, 27\u201331 March\u00a02000","DOI":"10.1007\/3-540-46439-5_8"},{"key":"664_CR14_664","doi-asserted-by":"crossref","unstructured":"Luo B, Lee D, Lee W, Liu P (2004) QFilter: fine-grained run-time XML access control via NFA-based query rewriting, CIKM\u201904. Washington, DC, USA, 8\u201313 November, 2004. ACM, pp 543\u2013552","DOI":"10.1145\/1031171.1031273"},{"key":"664_CR15_664","unstructured":"Gabillon A, Bruno E (2001) Regulating access to XML documents. In: Fifteenth annual IFIP WG 11.3 working conference on database security. Niagara on the Lake, Ontario, 15\u201318 July\u00a02001"},{"key":"664_CR16_664","unstructured":"XSLT. \n                  http:\/\/www.w3.org\/TR\/xslt20\/#xslt-mime-definition"},{"key":"664_CR17_664","doi-asserted-by":"crossref","unstructured":"Gabillon A (2004) An authorisation model for XML DataBases. In: Proceedings of the 11th ACM conference on computer security (workshop secure web services). George Mason University, Fairfax","DOI":"10.1145\/1111348.1111351"},{"key":"664_CR18_664","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.csi.2008.03.006","volume":"30","author":"E Damiani","year":"2008","unstructured":"Damiani E, Fansi M, Gabillon A, Marrara S (2008) A general approach to securely querying XML. Comput Stand Interface 30:379\u2013389","journal-title":"Comput Stand Interface"},{"issue":"1","key":"664_CR19_664","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T Yu","year":"2003","unstructured":"Yu T, Winslett M, Seamons KE (2003) Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans Inf Syst Sec 6(1):1\u201342","journal-title":"ACM Trans Inf Syst Sec"},{"key":"664_CR20_664","doi-asserted-by":"crossref","unstructured":"Cuppens F, Cuppens-Boulahia N, Coma C (2006) O2O: virtual private organizations to manage security policy interoperability. In: Second international conference on information systems security (ICISS\u201906), Calcutta","DOI":"10.1007\/11961635_7"},{"key":"664_CR21_664","volume-title":"Cryptography and data security","author":"DER Denning","year":"1982","unstructured":"Denning DER (1982) Cryptography and data security. Addison-Wesley, Reading"},{"issue":"1","key":"664_CR22_664","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park J, Sandhu R (2004) The UCON-ABC usage control model. ACM Trans Inf Syst Sec 7(1):128\u2013174","journal-title":"ACM Trans Inf Syst Sec"},{"key":"664_CR23_664","unstructured":"Cuppens F, Cuppens-Boulahia N, Sans T (2005) Nomad: a security model with non atomic actions and deadlines. In: Proceedings of the 18th IEEE workshop on computer security foundations (CSFW), Aix en Provence"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:22:24Z","timestamp":1591057344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_664","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}