{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:37:57Z","timestamp":1725838677030},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319256443"},{"type":"electronic","value":"9783319256450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25645-0_15","type":"book-chapter","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T07:24:45Z","timestamp":1448263485000},"page":"221-235","source":"Crossref","is-referenced-by-count":5,"title":["Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing"],"prefix":"10.1007","author":[{"given":"Mahendra Pratap","family":"Singh","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Ussama","family":"Yakub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/JSYST.2013.2242751","volume":"7","author":"R Abdunabi","year":"2013","unstructured":"Abdunabi, R., Al-Lail, M., Ray, I., France, R.B.: Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model. IEEE Systems Journal 7(3), 501\u2013515 (2013)","journal-title":"IEEE Systems Journal"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1007\/978-3-540-76843-2_32","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"S Aich","year":"2007","unstructured":"Aich, S., Sural, S., Majumdar, A.K.: STARBAC: Spatiotemporal Role Based Access Control. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1567\u20131582. Springer, Heidelberg (2007)"},{"key":"15_CR3","unstructured":"Ali, S., Rauf, A., Khusro, S., Zubair, M., Farman, H., Ullah, S.: An authorization model to access the summarized data of data warehouse. Life Sciences Journal 11(6s) (2014)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: ACM Symposium on Access Control Models and technologies, pp. 187\u2013196 (2009)","DOI":"10.1145\/1542207.1542238"},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. on Information and System Security 4(3), 191\u2013233 (2001)","journal-title":"ACM Trans. on Information and System Security"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Becker, M., Fournet, C., Gordon, A.: Design and semantics of a decentralized authorization language. In: IEEE Computer Security Foundations Symposium, pp. 3\u201315 (2007)","DOI":"10.1109\/CSF.2007.18"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadula, L.: Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, The Mitre Corporation, March 1976","DOI":"10.21236\/ADA023588"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: ACM Symposium on Access Control Models and Technologies, pp. 29\u201337. ACM, June 2005","DOI":"10.1145\/1063979.1063985"},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/248603.248616","volume":"26","author":"S Chaudhuri","year":"1997","unstructured":"Chaudhuri, S., Dayal, U.: An overview of data warehousing and OLAP technology. SIGMOD Record 26(1), 65\u201374 (1997)","journal-title":"SIGMOD Record"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Atluri, V.: A meta model for access control: why is it needed and is it even possible to achieve? In: ACM Symposium on Access Control Models and Technologies, pp. 153\u2013154 (2008)","DOI":"10.1145\/1377836.1377860"},{"issue":"4","key":"15_CR12","first-page":"412","volume":"57","author":"DF Ferraiolo","year":"2011","unstructured":"Ferraiolo, D.F., Atluri, V., Gavrila, S.I.: The policy machine: A novel architecture and framework for access control policy specification and enforcement. Journal of Systems Architecture - Embedded Systems Design 57(4), 412\u2013424 (2011)","journal-title":"Journal of Systems Architecture - Embedded Systems Design"},{"issue":"3","key":"15_CR13","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. on Information and System Security 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. on Information and System Security"},{"key":"15_CR14","unstructured":"Graham, G., Denning, P.: Protection principles and practice. In: AFIPS Spring Joint Computer Conference, pp. 417\u2013429 (1972)"},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., et al.: Flexible support for multiple access control policies. ACM Tran. on Database Systems 26(2), 214\u2013260 (2001)","journal-title":"ACM Tran. on Database Systems"},{"issue":"1","key":"15_CR16","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J Joshi","year":"2005","unstructured":"Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng. 17(1), 4\u201323 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"15_CR17","unstructured":"Lampson, B.: Protection. In: 5th Princeton Symposium on Information Science and Systems, pp. 437\u2013443 (1971)"},{"key":"15_CR18","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: IEEE Symposium on Security and Privacy, p. 114 (2002)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Molloy, I., Tripunitara, M.V., et al.: Panel on granularity in access control. In: ACM Symposium on Access Control Models and Technologies, pp. 85\u201386 (2013)","DOI":"10.1145\/2462410.2462889"},{"key":"15_CR20","unstructured":"National Institute of Standards and Technology, and National Security Agency. A survey of access control methods. Technical report (2009)"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11961635_10","volume-title":"Information Systems Security","author":"I Ray","year":"2006","unstructured":"Ray, I., Kumar, M., Yu, L.: LRBAC: a location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147\u2013161. Springer, Heidelberg (2006)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Ray, I., Toahchoodee, M.: A spatio temporal role based access control model. In: IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 211\u2013226 (2007)","DOI":"10.1007\/978-3-540-73538-0_16"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Sandhu, R., et al.: Role-based Access Control Models. IEEE Computer, 38\u201347 (1996)","DOI":"10.1109\/2.485845"},{"key":"15_CR24","unstructured":"OASIS XACML Technical Committee. OASIS extensible access control markup language (XACML) version 2.0"},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1504\/IJBIDM.2007.016379","volume":"2","author":"B Thuraisingham","year":"2007","unstructured":"Thuraisingham, B., Kantarcioglu, M., et al.: Extended rbac-based design and implementation for a secure data warehouse. International Journal of Business Intelligence and Data Mining 2(1), 367\u2013382 (2007)","journal-title":"International Journal of Business Intelligence and Data Mining"},{"issue":"3","key":"15_CR26","doi-asserted-by":"crossref","first-page":"399","DOI":"10.3233\/JCS-2010-0418","volume":"19","author":"M Toahchoodee","year":"2011","unstructured":"Toahchoodee, M., Ray, I.: On the formalization and analysis of a spatio-temporal role-based access control model. Journal of Computer Security 19(3), 399\u2013452 (2011)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25645-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:45:01Z","timestamp":1559306701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25645-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319256443","9783319256450"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25645-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}