{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:42:05Z","timestamp":1774975325270,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030005627","type":"print"},{"value":"9783030005634","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00563-4_68","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T11:35:29Z","timestamp":1538739329000},"page":"697-706","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Representing RCPBAC (Role-Involved Conditional Purpose-Based Access Control) in Ontology and SWRL"],"prefix":"10.1007","author":[{"given":"Ronghan","family":"Li","sequence":"first","affiliation":[]},{"given":"Zejun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Lifang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"issue":"6","key":"68_CR1","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.datak.2011.03.006","volume":"70","author":"D Beimel","year":"2011","unstructured":"Beimel, D., Peleg, M.: Editorial: using OWL and SWRL to represent and reason with situation-based access control policies. Data Knowl. Eng. 70(6), 596\u2013615 (2011)","journal-title":"Data Knowl. Eng."},{"issue":"4","key":"68_CR2","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s00778-006-0023-0","volume":"17","author":"JW Byun","year":"2008","unstructured":"Byun, J.W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J. Int. J. Very Large Data Bases 17(4), 603\u2013619 (2008)","journal-title":"VLDB J. Int. J. Very Large Data Bases"},{"issue":"11","key":"68_CR3","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1109\/TKDE.2014.2312112","volume":"26","author":"P Colombo","year":"2014","unstructured":"Colombo, P., Ferrari, E.: Enforcement of purpose based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 26(11), 2703\u20132716 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"68_CR4","unstructured":"Farzad, F., Yu, E., Hung, P.C.K.: Role-based access control requirements model with purpose extension. In: Anais Do WER 2007 - Workshop Em Engenharia De Requisitos, Toronto, Canada, May 2007, pp. 207\u2013216 (2007)"},{"key":"68_CR5","doi-asserted-by":"crossref","unstructured":"Finin, T., et al.: R OWL BAC: representing role based access control in OWL. In: ACM Symposium on Access Control Models and Technologies, pp. 73\u201382 (2008)","DOI":"10.1145\/1377836.1377849"},{"issue":"7","key":"68_CR6","first-page":"33","volume":"238","author":"IC Hsu","year":"2013","unstructured":"Hsu, I.C.: Extensible access control markup language integrated with semantic web technologies. Inf. Sci. 238(7), 33\u201351 (2013)","journal-title":"Inf. Sci."},{"key":"68_CR7","unstructured":"Kabir, M.E., Wang, H., Bertino, E.: A role-involved conditional purpose-based access control model. Kluwer Academic Publishers (2012)"},{"issue":"4s","key":"68_CR8","first-page":"1","volume":"12","author":"Yibin Li","year":"2016","unstructured":"Li, Y., Gai, K., Ming, Z., Zhao, H., Qiu, M.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimed. Comput. Commun. Appl. 12(4) (2016)","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"68_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1007\/978-3-540-88873-4_12","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"A Masoumzadeh","year":"2008","unstructured":"Masoumzadeh, A., Joshi, J.B.D.: PuRBAC: purpose-aware role-based access control. In: Meersman, R., Tari, Z. (eds.) OTM 2008. LNCS, vol. 5332, pp. 1104\u20131121. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88873-4_12"},{"key":"68_CR10","unstructured":"Moses, T.: Extensible access control markup language (xacml) version 3.0. oasis standard (2013)"},{"issue":"3","key":"68_CR11","first-page":"1","volume":"13","author":"Q Ni","year":"2010","unstructured":"Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-aware role-based access control. IEEE Secur. Priv. 13(3), 1\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"68_CR12","doi-asserted-by":"crossref","unstructured":"Priebe, T., Dobmeier, W., Kamprath, N.: Supporting attribute-based access control with ontologies. In: International Conference on Availability, Reliability and Security, p. 8 pp. (2006)","DOI":"10.1109\/ARES.2006.127"},{"key":"68_CR13","doi-asserted-by":"crossref","unstructured":"Sharma, N.K., Joshi, A.: Representing attribute based access control policies in OWL. In: IEEE Tenth International Conference on Semantic Computing, pp. 333\u2013336 (2016)","DOI":"10.1109\/ICSC.2016.16"},{"key":"68_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1007\/978-3-642-54924-3_106","volume-title":"Foundations of Intelligent Systems","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Zhou, Z., Li, J.: A purpose-involved role-based access control model. In: Wen, Z., Li, T. (eds.) Foundations of Intelligent Systems. AISC, vol. 277, pp. 1119\u20131131. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54924-3_106"},{"key":"68_CR15","doi-asserted-by":"crossref","unstructured":"Yang, L., Sinnott, R.O.: Semantic-based privacy protection of electronic health records for collaborative research. In: Trustcom\/BigDataSE\/I SPA, pp. 519\u2013526 (2017)","DOI":"10.1109\/TrustCom.2016.0105"},{"key":"68_CR16","doi-asserted-by":"crossref","unstructured":"Yang, N., Barringer, H., Zhang, N.: A purpose-based access control model. In: International Symposium on Information Assurance and Security, pp. 143\u2013148 (2007)","DOI":"10.1109\/IAS.2007.29"},{"key":"68_CR17","unstructured":"Ronghan, L.: Research on access control method based on privacy ontology reasoning. Master, Northwestern Polytechnical University (2017)"},{"key":"68_CR18","first-page":"1","volume":"1","author":"H Zhao","year":"2018","unstructured":"Zhao, H.: Robust information hiding in low-resolution videos with quantization index modulation in DCT-CS domain. Multimed. Tools Appl. 1, 1\u201314 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"68_CR19","first-page":"1","volume":"1","author":"H Zhao","year":"2017","unstructured":"Zhao, H., Dai, Q., Ren, J.C., Wei, W., Xiao, Y., Li, C.: Robust information hiding in low-resolution videos with quantization index modulation in DCT-CS domain. Multimed. Tools Appl. 1, 1\u201321 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"68_CR20","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/s12559-015-9357-5","volume":"8","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Ren, J.: Cognitive computation of compressed sensing for watermark signal measurement. Cogn. Comput. 8(2), 246\u2013260 (2016)","journal-title":"Cogn. Comput."},{"issue":"5","key":"68_CR21","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1007\/s12559-016-9424-6","volume":"8","author":"Y Zhou","year":"2016","unstructured":"Zhou, Y., Zeng, F.Z., Zhao, H.M., Murray, P., Ren, J.: Hierarchical visual perception and two-dimensional compressive sensing for effective content-based color image retrieval. Cogn. Comput. 8(5), 877\u2013889 (2016)","journal-title":"Cogn. Comput."}],"container-title":["Lecture Notes in Computer Science","Advances in Brain Inspired Cognitive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00563-4_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T15:09:49Z","timestamp":1774969789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00563-4_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030005627","9783030005634"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00563-4_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"BICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Brain Inspired Cognitive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bics2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}