{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T17:59:23Z","timestamp":1773338363851,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319208091","type":"print"},{"value":"9783319208107","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_17","type":"book-chapter","created":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T03:47:00Z","timestamp":1434944820000},"page":"242-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Integrating Attributes into Role-Based Access Control"],"prefix":"10.1007","author":[{"given":"Qasim Mahmood","family":"Rajpoot","sequence":"first","affiliation":[]},{"given":"Christian Damsgaard","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.A., Sandhu, R.: A model for attribute-based user-role assignment. In: Annual Computer Security Applications Conference, pp. 353\u2013362. IEEE (2002)","DOI":"10.1109\/CSAC.2002.1176307"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Symposium on Access Control Models and Technologies, pp. 10\u201320. ACM (2001)","DOI":"10.1145\/373256.373258"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-72163-5_14","volume-title":"Information Security Practice and Experience","author":"JH Chae","year":"2007","unstructured":"Chae, J.H., Shiri, N.: Formalization of RBAC policy with object class hierarchy. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 162\u2013176. Springer, Heidelberg (2007)"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1007\/11915072_108","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"MJ Covington","year":"2006","unstructured":"Covington, M.J., Sastry, M.R.: A contextual attribute-based access control model. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1996\u20132006. Springer, Heidelberg (2006)"},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MITP.2013.37","volume":"15","author":"E Coyne","year":"2013","unstructured":"Coyne, E., Weil, T.R.: ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof. 15(3), 14\u201316 (2013)","journal-title":"IT Prof."},{"issue":"3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Giuri, L., Iglio, P.: Role templates for content-based access control. In: Workshop on Role-Based Access Control, pp. 153\u2013159. ACM (1997)","DOI":"10.1145\/266741.266773"},{"key":"17_CR8","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/1-4020-8128-6_17","volume-title":"Research Directions in Data and Applications Security XVIII","author":"M Ge","year":"2004","unstructured":"Ge, M., Osborn, S.L.: A design for parameterized roles. In: Farkas, C., Samarati, P. (eds.) Research Directions in Data and Applications Security XVIII. IFIP, vol. 144, pp. 251\u2013264. Springer, Boston (2004)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Huang, J., Nicol, D.M., Bobba, R., Huh, J.H.: A framework integrating attribute-based policies into RBAC. In: Symposium on Access Control Models and Technologies, pp. 187\u2013196. ACM (2012)","DOI":"10.1145\/2295136.2295170"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-642-33704-8_8","volume-title":"Computer Network Security","author":"X Jin","year":"2012","unstructured":"Jin, X., Sandhu, R., Krishnan, R.: RABAC: role-centric attribute-based access control. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 84\u201396. Springer, Heidelberg (2012)"},{"key":"17_CR11","unstructured":"Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks (2003)"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"DR Kuhn","year":"2010","unstructured":"Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. IEEE Comput. 43, 79\u201381 (2010)","journal-title":"IEEE Comput."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kulkarni, D., Tripathi, A.: Context-Aware role-based access control in pervasive computing systems. In: Symposium on Access Control Models and Technologies, pp. 113\u2013122. ACM (2008)","DOI":"10.1145\/1377836.1377854"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Kern, A., Walhorn, C.: Rule support for role-based access control. In: Symposium on Access Control Models and Technologies, pp. 130\u2013138. ACM (2005)","DOI":"10.1145\/1063979.1064002"},{"key":"17_CR15","unstructured":"Moyer, M.J., Abamad, M.: Gener alized role-based access control. In: International Conference on Distributed Computing Systems, pp. 391\u2013398. IEEE (2001)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-73538-0_16","volume-title":"Data and Applications Security XXI","author":"I Ray","year":"2007","unstructured":"Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security XXI 2007. LNCS, vol. 4602, pp. 211\u2013226. Springer, Heidelberg (2007)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: IEEE International Conference on Web Services (2005)","DOI":"10.1109\/ICWS.2005.25"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T19:43:08Z","timestamp":1748461388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}