{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:08:46Z","timestamp":1726409326847},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_12","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T06:55:22Z","timestamp":1409986522000},"page":"178-182","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid Enforcement of Category-Based Access Control"],"prefix":"10.1007","author":[{"given":"Asad","family":"Ali","sequence":"first","affiliation":[]},{"given":"Maribel","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Ali, A., Fern\u00e1ndez, M.: Static enforcement of role-based access control. In: Ravara, A., Ter Beek, M. (eds.) Proceedings of the 10th International Workshop Automated Specification and Verification of Web Systems. EPTCS (2014)"},{"key":"12_CR2","first-page":"187","volume-title":"Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009","author":"S. Barker","year":"2009","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, pp. 187\u2013196. ACM, New York (2009)"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From uml models to access control infrastructures. ACM Trans. Softw. Eng. Methodol.\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-11747-3_11","volume-title":"Engineering Secure Software and Systems","author":"C. Bertolissi","year":"2010","unstructured":"Bertolissi, C., Fern\u00e1ndez, M.: Category-based authorisation models: Operational semantics and expressive power. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol.\u00a05965, pp. 140\u2013156. Springer, Heidelberg (2010)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bodden, E., Lam, P., Hendren, L.: Partially evaluating finite-state runtime monitors ahead of time. ACM Trans. Program. Lang. Syst.\u00a07, 7:1\u20137:52 (2012)","DOI":"10.1145\/2220365.2220366"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Eduardo, B.: Fernandez, Tami Sorgente, and Maria\u00a0M. Larrondo-Petrie. Even more patterns for secure operating systems. In: Proceedings of the 2006 Conference on Pattern Languages of Programs, PLoP 2006, pp. 10:1\u201310:9. ACM, New York (2006)","DOI":"10.1145\/1415472.1415484"},{"key":"12_CR7","unstructured":"Ferraiolo, D., Kuhn, R.: Role-based access control. In:15th NIST-NCSC National Computer Security Conference, pp. 554\u2013563 (1992)"},{"key":"12_CR8","unstructured":"Gosling, J., Joy, B., Steele, G., Bracha, G.: Java(TM) Language Specification, The (3rd edn.) (Java (Addison-Wesley)), 3rd edn. Addison-Wesley Professional (2005)"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst.\u00a028(1), 175\u2013205 (2006)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"3","key":"12_CR10","first-page":"26","volume":"1","author":"G.E. Krasner","year":"1988","unstructured":"Krasner, G.E., Pope, S.T.: A cookbook for using the model-view controller user interface paradigm in Smalltalk-80. J. Object Oriented Program.\u00a01(3), 26\u201349 (1988)","journal-title":"J. Object Oriented Program."}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:42:15Z","timestamp":1558971735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}