{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T02:52:21Z","timestamp":1761706341685,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_5","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T13:07:52Z","timestamp":1450271272000},"page":"61-78","source":"Crossref","is-referenced-by-count":13,"title":["Enforcing Separation of Duty in Attribute Based Access Control Systems"],"prefix":"10.1007","author":[{"given":"Sadhana","family":"Jha","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"5_CR1","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen, T.H.: Introduction to Algorithms. MIT press, Cambridge (2009)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies. In: IEEE Transactions on Dependable and Secure Computing (2015)","DOI":"10.1109\/TDSC.2014.2369048"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/978-3-319-15934-8_24","volume-title":"Evolutionary Multi-Criterion Optimization","author":"E Medvet","year":"2015","unstructured":"Medvet, E., Bartoli, A., Carminati, B., Ferrari, E.: Evolutionary Inference of Attribute-Based Access Control Policies. In: Gaspar-Cunha, A., Henggeler Antunes, C., Coello, C.C. (eds.) EMO 2015. LNCS, vol. 9018, pp. 351\u2013365. Springer, Heidelberg (2015)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandhu, R., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Nurmamat, H., Rahman, K.: Attribute based access control constraint based on subject similarity. In: Proceedings of the IEEE Workshop on Advanced Research and Technology in Industry Applications, pp. 226\u2013229 (2014)","DOI":"10.1109\/WARTIA.2014.6976238"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Lakkaraju, S., Dianxiang, X.: Integrated modeling and analysis of attribute based access control policies and workflows in healthcare. In: Proceedings of the International Conference on Trustworthy Systems and their Applications (TSA), pp. 36\u201343. IEEE (2014)","DOI":"10.1109\/TSA.2014.15"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Zaman, B.K., Krishnan, R., Sandhu, R.: Towards an attribute based constraints specification language. In: Proceedings of the IEEE International Conference on Social Computing, pp. 108\u2013113 (2013)","DOI":"10.1109\/SocialCom.2013.23"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Xu, Z., Stoller, S.D.: Mining attribute-based access control policies from RBAC policies. In: Proceedings of the International Conference and Expo on Emerging Technologies for a Smarter World, pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/CEWIT.2013.6713753"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Jin, X., Krishnan, R., Sandhu, R.S.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Proceedings of the 26th Annual Conference on Data and Applications Security and Privacy, pp. 41\u201355 (2012)","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Huang, J., Nicol, D.M., Bobba, R., Huh, J.H.: A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, pp. 187\u2013196. ACM (2012)","DOI":"10.1145\/2295136.2295170"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., Tripunitara, M.V., Bizri, Z.: On mutually exclusive roles and separation-of-duty. In: ACM Transactions on Information and System Security (TISSEC) (2007)","DOI":"10.1145\/1237500.1237501"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Ray, I.: TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, pp. 49\u201358. ACM (2006)","DOI":"10.1145\/1133058.1133067"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Yuan, E. Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Workshop on Web Services (2005)","DOI":"10.1109\/ICWS.2005.25"},{"key":"5_CR14","unstructured":"Ernesto, D., Vimercati, S.D.C.D., Samarati, P.: New paradigms for access control in open environments. In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 540\u2013545 (2005)"},{"key":"5_CR15","unstructured":"Lingyu, W., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: Proceedings of the ACM Workshop on Formal Methods in Security Engineering, pp. 45\u201355 (2004)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. In: IEEE Computer, pp. 38\u201347 (1999)","DOI":"10.1109\/2.485845"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Osborn, S.: Mandatory access control and role-based access control revisited. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control, pp. 31\u201340 (1997)","DOI":"10.1145\/266741.266751"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: On protection in operating systems. In: Communications of the ACM, pp. 461\u2013471 (1976)","DOI":"10.1145\/360303.360333"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Clark, D.D., Wilson, D.R.: A comparision of commercial and military computer security policies. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184\u2013194. IEEE Computer Society (1987)","DOI":"10.1109\/SP.1987.10001"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T20:20:22Z","timestamp":1748722822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}