{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:35:35Z","timestamp":1742913335707,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030440374"},{"type":"electronic","value":"9783030440381"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44038-1_21","type":"book-chapter","created":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T09:04:07Z","timestamp":1585559047000},"page":"223-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Review Towards the Development of Ontology Based Identity and Access Management Metamodel"],"prefix":"10.1007","author":[{"given":"Kamrun","family":"Nahar","sequence":"first","affiliation":[]},{"given":"Asif Qumer","family":"Gill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,31]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Ahn, G.-J., Ko, M., Shehab, M.: Privacy-enhanced user-centric identity management. In: 2009 IEEE International Conference on Communications, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199363"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Buffa, M., Faron-Zucker, C.: Ontology-based access rights management. In: Advances in Knowledge Discovery and Management, pp. 49\u201361. Springer, Berlin, (2012)","DOI":"10.1007\/978-3-642-25838-1_3"},{"issue":"3","key":"21_CR3","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s11227-013-0980-1","volume":"67","author":"C Choi","year":"2014","unstructured":"Choi, C., Choi, J., Kim, P.J.: Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 67(3), 711\u2013722 (2014)","journal-title":"J. Supercomput."},{"issue":"1","key":"21_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/S0169-023X(02)00195-7","volume":"46","author":"O Corcho","year":"2003","unstructured":"Corcho, O., Fern\u00e1ndez-L\u00f3pez, M., G\u00f3mez-P\u00e9rez, A.: Methodologies, tools and languages for building ontologies. Where is their meeting point? Data Knowl. Eng. 46(1), 41\u201364 (2003)","journal-title":"Data Knowl. Eng."},{"issue":"4","key":"21_CR5","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1504\/IJBPIM.2009.032281","volume":"4","author":"RDA Falbo","year":"2009","unstructured":"Falbo, R.D.A., Bertollo, G.J.: A software process ontology as a common vocabulary about software processes. Int. J. Bus. Process Integr. Manag. 4(4), 239\u2013250 (2009)","journal-title":"Int. J. Bus. Process Integr. Manag."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Raje, S., Davuluri, C., Freitas, M., Ramnath, R., Ramanathan, J.: Using ontology-based methods for implementing role-based access control in cooperative systems. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 763\u2013764 (2012)","DOI":"10.1145\/2245276.2245421"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijiit.2014010101","volume":"10","author":"AQ Gill","year":"2014","unstructured":"Gill, A.Q.: Applying agility and living service systems thinking to enterprise architecture. Int. J. Intell. Inf. Technol. 10(1), 1\u201315 (2014)","journal-title":"Int. J. Intell. Inf. Technol."},{"issue":"1","key":"21_CR8","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10257-015-0276-5","volume":"14","author":"A Goldstein","year":"2016","unstructured":"Goldstein, A., Frank, U.: Components of a multi-perspective modeling method for designing and managing IT security systems. Inf. Syst. eBus. Manage. 14(1), 101\u2013140 (2016)","journal-title":"Inf. Syst. eBus. Manage."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Gong, L., Tian, Y.: Threat modeling for cyber range: an ontology-based approach. In: International Conference in Communications, Signal Processing, and Systems, pp. 1055\u20131062. Springer (2018)","DOI":"10.1007\/978-981-13-6508-9_128"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber, T.R.: A translation approach to portable ontology specifications. Knowl. Acquis. 5(2), 199\u2013220 (1993)","journal-title":"Knowl. Acquis."},{"key":"21_CR11","first-page":"18","volume":"155","author":"G Guizzardi","year":"2007","unstructured":"Guizzardi, G.: On ontology, ontologies, conceptualizations, modeling languages, and (meta) models. Front. Artif. Intell. Appl. 155, 18 (2007)","journal-title":"Front. Artif. Intell. Appl."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Imran-Daud, M., S\u00e1nchez, D., Viejo, A.: Ontology-based access control management: two use cases. In: Proceedings 8th International Conference on Agents and Artificial Intelligence, pp. 244\u2013249 (2016)","DOI":"10.5220\/0005777902440249"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Indu, I., Anand, P.R.: Identity and access management for cloud web services. In: 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), pp. 406\u2013410. IEEE (2015)","DOI":"10.1109\/RAICS.2015.7488450"},{"issue":"5","key":"21_CR14","first-page":"6","volume":"104","author":"DB Jayant","year":"2014","unstructured":"Jayant, D.B., Swapnaja, A.U., Sulabha, S.A., Dattatray, G.M.: Analysis of dac mac rbac access control based models for security. Int. J. Comput. Appl. 104(5), 6\u201313 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Kayes, A., Rahayu, W., Dillon, T.: An ontology-based approach to dynamic contextual role for pervasive access control. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp. 601\u2013608. IEEE (2018)","DOI":"10.1109\/AINA.2018.00093"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Keltoum, B., Samia, B.: A dynamic federated identity management approach for cloud-based environments. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, p. 104. ACM (2017)","DOI":"10.1145\/3018896.3025152"},{"key":"21_CR17","unstructured":"Kooker, R., Kane, S.: Identity management: role based access control for enterprise services. Science Applications International Corp Honolulu, HI (2004)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"L\u2019Amrani, H., Berroukech, B.E., El Idrissi, Y.E.B., Ajhoun, R.L.: Identity management systems: laws of identity for models 7 evaluation. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 736\u2013740. IEEE (2016)","DOI":"10.1109\/CIST.2016.7804984"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Layouni, F., Pollet, Y.: An ontology-based architecture for federated identity management. In: 2009 International Conference on Advanced Information Networking and Applications, pp. 162\u2013166. IEEE (2009)","DOI":"10.1109\/AINA.2009.124"},{"key":"21_CR20","unstructured":"Mohamamdi, M., Kishore, K.: Analysis of common access control models and their limitations in cloud computing environment. Int. J. Sci. Res. 6(11), 1940\u20131943 (2017)"},{"key":"21_CR21","unstructured":"Neo4j Graph Database Neo4j Graph Platform: https:\/\/neo4j.com\/. Accessed 25 Nov 2019"},{"key":"21_CR22","unstructured":"Noy, N.F., McGuinness, D.L.: Ontology development 101: a guide to creating your first ontology. Stanford knowledge systems laboratory technical report KSL-01-05 (2001)"},{"key":"21_CR23","unstructured":"Saeki, M., Kaiya, H.: On relationships among models, meta models and ontologies. In: Proceedings of the Proceedings of the 6th OOPSLA Workshop on Domain-Specific Modeling (DSM 2006)"},{"issue":"1\u20132","key":"21_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/S0169-023X(97)00056-6","volume":"25","author":"R Studer","year":"1998","unstructured":"Studer, R., Benjamins, V.R., Fensel, D.: Knowledge engineering: principles and methods. Data Knowl. Eng. 25(1\u20132), 161\u2013197 (1998)","journal-title":"Data Knowl. Eng."},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Thakur, M.A., Gaikwad, R.: User identity and access management trends in IT infrastructure-an overview. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/PERVASIVE.2015.7086972"},{"key":"21_CR26","unstructured":"The Open Group: The Archimate 3.1 specification (2019). https:\/\/pubs.opengroup.org\/architecture\/archimate3-doc\/. Accessed 20 Nov 2019"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Vossaert, J., Verhaeghe, P., De Decker, B., Naessens, V.: A smart card based solution for user-centric identity management. In: IFIP PrimeLife International Summer School on Privacy and Identity Management for Life, pp. 164\u2013177. Springer (2010)","DOI":"10.1007\/978-3-642-20769-3_14"},{"issue":"3","key":"21_CR28","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1365-2575.1995.tb00108.x","volume":"5","author":"Y Wand","year":"1995","unstructured":"Wand, Y., Weber, R.: On the deep structure of information systems. Inf. Syst. J. 5(3), 203\u2013223 (1995)","journal-title":"Inf. Syst. J."},{"issue":"4","key":"21_CR29","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/0950-5849(95)01052-1","volume":"38","author":"Y Wand","year":"1996","unstructured":"Wand, Y.: Ontology as a foundation for meta-modelling and method engineering. Inf. Softw. Technol. 38(4), 281\u2013287 (1996)","journal-title":"Inf. Softw. Technol."}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44038-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T20:16:17Z","timestamp":1669320977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-44038-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440374","9783030440381"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44038-1_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of  the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caserta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}