{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:42:25Z","timestamp":1759092145744,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030036379"},{"type":"electronic","value":"9783030036386"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03638-6_17","type":"book-chapter","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T03:12:53Z","timestamp":1541041973000},"page":"272-288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Authorization Policies Specification and Consistency Management within Multi-cloud Environments"],"prefix":"10.1007","author":[{"given":"Ehtesham","family":"Zahoor","sequence":"first","affiliation":[]},{"given":"Asim","family":"Ikram","sequence":"additional","affiliation":[]},{"given":"Sabina","family":"Akhtar","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Perrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"17_CR1","unstructured":"Elliott, A., Knight, S.: Role explosion: acknowledging the problem. In: Proceedings of the 2010 International Conference on Software Engineering Research & Practice, SERP 2010, Las Vegas, Nevada, USA, 2 volumes, pp. 349\u2013355, 12\u201315 July 2010"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800\u2013162 (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM 2010, pp. 534\u2013542 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"issue":"4","key":"17_CR4","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/TSC.2014.2363474","volume":"8","author":"Y Zhu","year":"2015","unstructured":"Zhu, Y., Huang, D., Hu, C., Wang, X.: From RBAC to ABAC: constructing flexible data access control for cloud storage services. IEEE Trans. Serv. Comput. 8(4), 601\u2013616 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"7","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","volume":"25","author":"K Yang","year":"2014","unstructured":"Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735\u20131744 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"17_CR6","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187\u20131198 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Bryans, J.: Reasoning about XACML policies using CSP. In: SWS, pp. 28\u201335 (2005)","DOI":"10.1145\/1103022.1103028"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N., Thi, K.T.L., Dang, A.T., Van, H.D.S., Dang, T.K.: Towards a flexible framework to support a generalized extension of XACML for spatio-temporal RBAC model with reasoning ability. In: ICCSA, vol. 5 (2013)","DOI":"10.1007\/978-3-642-39640-3_32"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Kolovski, V., Hendler, J.A., Parsia, B.: Analyzing web access control policies. In: WWW, pp. 677\u2013686 (2007)","DOI":"10.1145\/1242572.1242664"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/978-94-007-2169-2_124","volume-title":"Lecture Notes in Electrical Engineering","author":"Feng Liang","year":"2012","unstructured":"Liang, F., Guo, H., Yi, S., Zhang, X., Ma, S.: An attributes-based access control architecture within large-scale device collaboration systems using XACML. In: Yang, Y., Ma, M. (eds.) Green Communications and Networks. Lecture Notes in Electrical Engineering, vol. 113. Springer, Dordrecht (2012). https:\/\/doi.org\/10.1007\/978-94-007-2169-2_124"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-54792-8_14","volume-title":"Principles of Security and Trust","author":"P Tsankov","year":"2014","unstructured":"Tsankov, P., Marinovic, S., Dashti, M.T., Basin, D.: Decentralized composite access control. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 245\u2013264. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54792-8_14"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"PA Bonatti","year":"2002","unstructured":"Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1), 1\u201335 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330295.1330299","volume":"11","author":"Pietro Mazzoleni","year":"2008","unstructured":"Mazzoleni, P., Crispo, B., Sivasubramanian, S., Bertino, E.: XACML policy integration algorithms. ACM Trans. Inf. Syst. Secur. 11(1), 4:1\u20134:29 (2008)","journal-title":"ACM Transactions on Information and System Security"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Pustchi, N., Krishnan, R., Sandhu, R.S.: Authorization federation in IAAS multi cloud. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS 2015, Singapore, Republic of Singapore, pp. 63\u201371, 14 April 2015","DOI":"10.1145\/2732516.2732523"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Rao, P., Lin, D., Bertino, E., Li, N., Lobo, J.: An algebra for fine-grained integration of XACML policies. In: Proceedings of 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, pp. 63\u201372, 3\u20135 June 2009","DOI":"10.1145\/1542207.1542218"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Ramya, P., Saraswathy, S., Sharmila, S., Sivakumar, S.: T-Broker- a trust-aware service brokering scheme for multiple cloud collaborative services. IEEE Trans. Inf. Forens. Secur. 10(7), 1402\u20131415 (2015)","DOI":"10.1109\/TIFS.2015.2413386"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Alansari, S., Paci, F., Sassone, V.: A distributed access control system for cloud federations. In: International Conference on Distributed Computing Systems (2017)","DOI":"10.1109\/ICDCS.2017.241"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Zahoor, E., Asma, Z., Perrin, O.: A formal approach for the verification of AWS IAM access control policies. In: European Conference on Service-Oriented and Cloud Computing (2017)","DOI":"10.1007\/978-3-319-67262-5_5"},{"issue":"1","key":"17_CR19","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"Robert Kowalski","year":"1986","unstructured":"Kowalski, R.A., Sergot, M.J.: A logic-based calculus of events. New Gener. Comput. 4(1), 67\u201395 (1986)","journal-title":"New Generation Computing"},{"key":"17_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012369388-4\/50072-2","volume-title":"Commonsense Reasoning","author":"ET Mueller","year":"2006","unstructured":"Mueller, E.T.: Commonsense Reasoning. Morgan Kaufmann Publishers Inc., California (2006)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Zahoor, E., Perrin, O., Godart, C.: An event-based reasoning approach to web services monitoring. In: ICWS (2011)","DOI":"10.1109\/ICWS.2011.97"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03638-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T06:16:16Z","timestamp":1572416176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03638-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030036379","9783030036386"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03638-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securitylab.no\/nordsec18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}