{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:58:54Z","timestamp":1743116334470,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030397487"},{"type":"electronic","value":"9783030397494"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39749-4_4","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T18:03:07Z","timestamp":1579888987000},"page":"52-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC)"],"prefix":"10.1007","author":[{"given":"Dominic","family":"Heutelbeck","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"key":"4_CR1","unstructured":"American National Standards Institute: INCITS 499\u20132018: Information technology - next generation access control - functional architecture. Technical report, American National Standards Institute (2018)"},{"key":"4_CR2","volume-title":"Cultural Studies: Theory and Practice","author":"C Barker","year":"2003","unstructured":"Barker, C.: Cultural Studies: Theory and Practice. Sage, Thousand Oaks (2003)"},{"key":"4_CR3","unstructured":"Bon\u00e9r, J., et al.: The reactive manifesto (2014). https:\/\/www.reactivemanifesto.org\/. Accessed 15 May 2019"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Bray, T.: The JavaScript Object Notation (JSON) Data Interchange Format. RFC 7159, March 2014. https:\/\/doi.org\/10.17487\/RFC7159, https:\/\/rfc-editor.org\/rfc\/rfc7159.txt","DOI":"10.17487\/RFC7159"},{"key":"4_CR5","unstructured":"Open Geospatial Consortium: Geospatial extensible access control markup language (GeoXACML). Technical report, Open Geospatial Consortium (2011). https:\/\/www.opengeospatial.org\/standards\/geoxacml"},{"key":"4_CR6","volume-title":"Design Patterns: Elements of Reusable Object-oriented Software","author":"E Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-oriented Software. Addison-Wesley Longman Publishing Co., Inc., Boston (1995)"},{"key":"4_CR7","unstructured":"Gossner, S.: JSONPath - XPath for JSON (2006). https:\/\/goessner.net\/articles\/JsonPath\/. Accessed 14 June 2019"},{"key":"4_CR8","unstructured":"Heutelbeck, D.: Attribute stream-based access control (ASBAC) - functional architecture and patterns. In: Proceedings of the 2019 International Conference of Security and Management (SAM 2019) (2019)"},{"key":"4_CR9","unstructured":"Heutelbeck, D.: SAPL policy engine (2019). https:\/\/github.com\/heutelbeck\/sapl-policy-engine. Accessed 10 May 2019"},{"key":"4_CR10","unstructured":"Heutelbeck, D.: SAPL policy engine demos (2019). https:\/\/github.com\/heutelbeck\/sapl-demos. Accessed 10 May 2019"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations. Technical report, National Institute of Standards and Technology, January 2014. https:\/\/doi.org\/10.6028\/nist.sp.800-162","DOI":"10.6028\/nist.sp.800-162"},{"key":"4_CR12","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-04062-7_11","volume-title":"Global Security, Safety, and Sustainability","author":"AC Ijeh","year":"2009","unstructured":"Ijeh, A.C., Brimicombe, A.J., Preston, D.S., Imafidon, C.O.: Geofencing in a security strategy model. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds.) ICGS3 2009. CCIS, vol. 45, pp. 104\u2013111. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04062-7_11"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-319-93524-9_4","volume-title":"Information Security Theory and Practice","author":"H Jiang","year":"2018","unstructured":"Jiang, H., Bouabdallah, A.: JACPoL: a simple but expressive JSON-based access control policy language. In: Hancke, G.P., Damiani, E. (eds.) WISTP 2017. LNCS, vol. 10741, pp. 56\u201372. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93524-9_4"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-69459-7_2","volume-title":"On the Move to Meaningful Internet Systems","author":"H Jiang","year":"2017","unstructured":"Jiang, H., Bouabdallah, A.: Towards a JSON-based fast policy evaluation framework. In: Panetto, H., et al. (eds.) OTM 2017. LNCS, vol. 10574, pp. 22\u201330. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69459-7_2"},{"key":"4_CR15","unstructured":"Latham, D.C.: Department of defense trusted computer system evaluation criteria. Department of Defense (1986)"},{"key":"4_CR16","unstructured":"Linklater, G., Smith, C., Connan, J., Herbert, A., Irwin, B.V.: JSON schema for attribute-based access control for network resource security. In: Proceedings of Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2017). (2017)"},{"key":"4_CR17","unstructured":"Lockhart, H., Parducci, B.: JSON profile of XACML 3.0 version 1.0 (2017). http:\/\/docs.oasis-open.org\/xacml\/xacml-json-http\/v1.0\/xacml-json-http-v1.0.html. Accessed 10 May 2019"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Role-based access control. In: Advances in Computers, vol. 46, pp. 237\u2013286. Elsevier (1998)","DOI":"10.1016\/S0065-2458(08)60206-5"},{"key":"4_CR19","unstructured":"XACML 3.0 Committee: extensible access control markup language (XACML) version 3.0 (2013). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html. Accessed 10 May 2019"},{"key":"4_CR20","unstructured":"XACML 3.0 Committee: Abbreviated language for authorization version 1.0 (2015). https:\/\/www.oasis-open.org\/committees\/download.php\/55228\/alfa-for-xacml-v1.0-wd01.doc. Accessed 10 May 2019"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39749-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T23:04:02Z","timestamp":1737673442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-39749-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030397487","9783030397494"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39749-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iit.cnr.it\/etaa2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}