{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:31:42Z","timestamp":1743150702484,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_6","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"79-97","source":"Crossref","is-referenced-by-count":4,"title":["Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework"],"prefix":"10.1007","author":[{"given":"Phillipa","family":"Bennett","sequence":"first","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Robert","family":"France","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"6_CR1","unstructured":"Bennett, P.L., Ray, I., France, R.B.: Analysis of a relationship based access control model. In: C3S2E15 (2015)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bruns, G., Fong, P.W.L., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: Bertino, E., Sandhu, R.S. (eds.) CODASPY. ACM (2012)","DOI":"10.1145\/2133601.2133616"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/1609956.1609962","volume":"13","author":"B Carminati","year":"2009","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 6:1\u20136:38 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Park, J., Sandhu, R.S.: Relationship-based access control for online social networks: beyond user-to-user relationships. In: SocialCom\/PASSAT, IEEE (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-31540-4_2","volume-title":"Data and Applications Security and Privacy XXVI","author":"Y Cheng","year":"2012","unstructured":"Cheng, Y., Park, J., Sandhu, R.: A user-to-user relationship-based access control model for online social networks. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 8\u201324. Springer, Heidelberg (2012)"},{"key":"6_CR6","unstructured":"Ferraiolo, W.J.D., Gavrila, S.: Policy machine: Features, architecture, and specification. Technical report, NIST, December 2012"},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.sysarc.2010.04.005","volume":"57","author":"D Ferraiolo","year":"2011","unstructured":"Ferraiolo, D., Atluri, V., Gavrila, S.: The policy machine: a novel architecture and framework for access control policy specification and enforcement. J. Syst. Archit. 57(4), 412\u2013424 (2011)","journal-title":"J. Syst. Archit."},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MC.2013.130","volume":"46","author":"DF Ferraiolo","year":"2013","unstructured":"Ferraiolo, D.F., Gavrila, S.I., Jansen, W.A.: Enabling an enterprise-wide, data-centric operating environment. IEEE Comput. 46(4), 94\u201396 (2013)","journal-title":"IEEE Comput."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Sandhu, R.S., Bertino, E. (eds.) CODASPY, pp. 191\u2013202. ACM (2011)","DOI":"10.1145\/1943513.1943539"},{"key":"6_CR10","volume-title":"Software Abstractions: Logic, Language, and Analysis","author":"D Jackson","year":"2012","unstructured":"Jackson, D.: Software Abstractions: Logic, Language, and Analysis. The MIT Press, Cambridge (2012)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Javed, Y., Shehab, M.: Access control policy misconfiguration detection in online social networks. In: SocialCom\/PASSAT, pp. 544\u2013549. IEEE, September 2013","DOI":"10.1109\/SocialCom.2013.82"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Johnson, M.L., Egelman, S., Bellovin, S.M.: Facebook and privacy: it\u2019s complicated. In: Cranor, L.F. (eds.) SOUPS, p. 9. ACM, July 2012","DOI":"10.1145\/2335356.2335369"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Madejski, M., Johnson, M.L., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: PerCom Workshop, pp. 340\u2013345. IEEE, March 2012","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"6_CR14","unstructured":"Squicciarini, A.C., Xu, A., Zhang, X.(L).: Cope: enabling collaborative privacy management in online social networks. J. Am. Soc. Inf. Sci. Technol. 62(3), 521\u2013534 (2011)"},{"key":"6_CR15","series-title":"Studies on the Semantic Web","volume-title":"Relation Based Access Control","author":"R Zhang","year":"2010","unstructured":"Zhang, R.: Relation Based Access Control. Studies on the Semantic Web, vol. 5. IOS Press, Heidelberg (2010)"},{"key":"6_CR16","unstructured":"Zhang, R., Artale, A., Giunchiglia, F., Crispo, B.: Using description logics in relation based access control. In: Grau, B.C., Horrocks, I., Motik, B., Sattler, U. (eds.) Description Logics. CEUR Workshop Proceedings, vol. 477 (2009). \n                      CEUR-WS.org"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11277-009-9782-4","volume":"55","author":"R Zhang","year":"2010","unstructured":"Zhang, R., Giunchiglia, F., Crispo, B., Song, L.: Relation-based access control: an access control model for context-aware computing environment. Wirel. Pers. Commun. 55(1), 5\u201317 (2010)","journal-title":"Wirel. Pers. Commun."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:06:17Z","timestamp":1559333177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}