{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T13:10:07Z","timestamp":1748783407495,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319301617"},{"type":"electronic","value":"9783319301624"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30162-4_7","type":"book-chapter","created":{"date-parts":[[2016,2,19]],"date-time":"2016-02-19T04:55:24Z","timestamp":1455857724000},"page":"98-119","source":"Crossref","is-referenced-by-count":0,"title":["Hypergraph-Based Access Control Using Organizational Models and Formal Language Expressions \u2013 $$\\mathcal {HGAC}$$ HGAC"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Lawall","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,20]]},"reference":[{"key":"7_CR1","volume-title":"Access Control Systems: Security, Identity Management and Trust Models","author":"M Benantar","year":"2006","unstructured":"Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer, New York (2006)"},{"key":"7_CR2","unstructured":"Chen, L.: Analyzing and Developing Role-Based Access Control Models. Ph.D. thesis, University of London (2011)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhang, L.: Research on role-based dynamic access control. In: Proceedings of the iConference, iConference 2011, pp. 657\u2013660. ACM, New York (2011)","DOI":"10.1145\/1940761.1940858"},{"key":"7_CR4","series-title":"Artech House Computer Security Series","volume-title":"Role-Based Access Control","author":"D Ferraiolo","year":"2003","unstructured":"Ferraiolo, D., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House Computer Security Series. Artech House, Norwood (2003)"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"DF Ferraiolo","year":"1999","unstructured":"Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 2, 34\u201364 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR7","series-title":"Synthesis Lectures on Data Management","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01836-7","volume-title":"Access Control in Data Management Systems","author":"E Ferrari","year":"2010","unstructured":"Ferrari, E.: Access Control in Data Management Systems. Synthesis Lectures on Data Management. Morgan & Claypool, San Rafael (2010)"},{"key":"7_CR8","volume-title":"Domain-Specific Languages","author":"M Fowler","year":"2010","unstructured":"Fowler, M.: Domain-Specific Languages. Addison-Wesley Professional, Boston (2010)"},{"issue":"2\u20133","key":"7_CR9","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/0166-218X(93)90045-P","volume":"42","author":"G Gallo","year":"1993","unstructured":"Gallo, G., Longo, G., Pallottino, S., Nguyen, S.: Directed Hypergraphs and Applications. Discrete Appl. Math. 42(2\u20133), 177\u2013201 (1993)","journal-title":"Discrete Appl. Math."},{"key":"7_CR10","unstructured":"Graham, G.S., Denning, P.J.: Protection: principles and practice. In: Proceedings of the May 16\u201318, Spring Joint Computer Conference, AFIPS 1972 (Spring), pp. 417\u2013429. ACM, New York (1972)"},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.3139\/9783446428546","volume-title":"Theoretische Informatik","author":"DW Hoffmann","year":"2011","unstructured":"Hoffmann, D.W.: Theoretische Informatik, 2nd edn. Carl Hanser, M\u00fcnchen (2011)","edition":"2"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Knorr, K.: Dynamic access control through petri net workflows. In: 16th Annual Conference of Computer Security Applications, ACSAC 2000, pp. 159\u2013167, December 2000","DOI":"10.1109\/ACSAC.2000.898869"},{"key":"7_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04286-7","volume-title":"Informationsmanagement","author":"H Krcmar","year":"2010","unstructured":"Krcmar, H.: Informationsmanagement. Springer, Heidelberg (2010)"},{"key":"7_CR14","unstructured":"Lawall, A., Reichelt, D., Schaller, T.: Intelligente Verzeichnisdienste. In: Barton, T., Erdlenbruch, B., Herrmann, F., M\u00fcller, C. (eds.) Herausforderungen an die Wirtschaftsinformatik: Betriebliche Anwendungssysteme, AKWI, pp. 87\u2013100. News & Media, Berlin (2011)"},{"key":"#cr-split#-7_CR15.1","doi-asserted-by":"crossref","unstructured":"Lawall, A., Reichelt, D., Schaller, T.: Propagation of agents to trusted organizations. In: 2014 IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence","DOI":"10.1109\/WI-IAT.2014.199"},{"key":"#cr-split#-7_CR15.2","unstructured":"(WI) and Intelligent Agent Technologies (IAT), vol. 3, pp. 433-439, August 2014"},{"key":"7_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-29133-3_3","volume-title":"S-BPM ONE \u2013 Scientific Research","author":"A Lawall","year":"2012","unstructured":"Lawall, A., Schaller, T., Reichelt, D.: An approach towards subject-oriented access control. In: Stary, C. (ed.) S-BPM ONE \u2013 Scientific Research. LNBIP, vol. 104, pp. 33\u201342. Springer, Heidelberg (2012)"},{"key":"7_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-36754-0_2","volume-title":"S-BPM ONE - Running Processes","author":"A Lawall","year":"2013","unstructured":"Lawall, A., Schaller, T., Reichelt, D.: Integration of dynamic role resolution within the S-BPM approach. In: Fischer, H., Schneeberger, J. (eds.) S-BPM ONE - Running Processes. CCIS, vol. 360, pp. 21\u201333. Springer, Heidelberg (2013)"},{"key":"#cr-split#-7_CR18.1","doi-asserted-by":"crossref","unstructured":"Lawall, A., Schaller, T., Reichelt, D.: Who does what - comparison of approaches for the definition of agents in workflows. In: 2013 IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence","DOI":"10.1109\/WI-IAT.2013.153"},{"key":"#cr-split#-7_CR18.2","unstructured":"(WI) and Intelligent Agent Technologies (IAT), vol. 3, pp. 74-77, November 2013"},{"key":"7_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-06065-1_6","volume-title":"S-BPM ONE - Scientific Research","author":"A Lawall","year":"2014","unstructured":"Lawall, A., Schaller, T., Reichelt, D.: Cross-organizational and context-sensitive modeling of organizational dependencies in C-ORG. In: Nanopoulos, A., Schmidt, W. (eds.) S-BPM ONE - Scientific Research. LNBIP, vol. 170, pp. 89\u2013109. Springer, Heidelberg (2014)"},{"key":"7_CR20","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-3-662-44860-1_5","volume-title":"Enterprise and Organizational Modeling and Simulation","author":"A Lawall","year":"2014","unstructured":"Lawall, A., Schaller, T., Reichelt, D.: Enterprise architecture: a formalism for modeling organizational structures in information systems. In: Barjis, J., Pergl, R. (eds.) EOMAS 2014. LNBIP, vol. 191, pp. 77\u201395. Springer, Heidelberg (2014)"},{"key":"#cr-split#-7_CR21.1","doi-asserted-by":"crossref","unstructured":"Lawall, A., Schaller, T., Reichelt, D.: Local-global agent failover based on organizational models. In: 2014 IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence","DOI":"10.1109\/WI-IAT.2014.197"},{"key":"#cr-split#-7_CR21.2","unstructured":"(WI) and Intelligent Agent Technologies (IAT), vol. 3, pp. 420-427, August 2014"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Lawall, A., Schaller, T., Reichelt, D.: Restricted relations between organizations for cross-organizational processes. In: 2014 IEEE 16th Conference on Business Informatics (CBI), Geneva, pp. 74\u201380, July 2014","DOI":"10.1109\/CBI.2014.8"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Y.A., Wang, C., Gorbovitski, M., Rothamel, T., Cheng, Y., Zhao, Y., Zhang, J.: Core role-based access control: efficient implementations by transformations. In: Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, PEPM 2006, pp. 112\u2013120. ACM, New York (2006)","DOI":"10.1145\/1111542.1111562"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: The typed access matrix model. In: Proceedings of the IEEE Symposium on Security and Privacy, SP 1992, pp. 122\u2013136. IEEE Computer Society, Washington, D.C. (1992)","DOI":"10.1109\/RISP.1992.213266"},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0065-2458(08)60206-5","volume":"46","author":"RS Sandhu","year":"1998","unstructured":"Sandhu, R.S.: Role-based access control. Adv. Comput. 46, 237\u2013286 (1998)","journal-title":"Adv. Comput."},{"issue":"2","key":"7_CR26","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"issue":"4","key":"7_CR27","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/506084.506085","volume":"35","author":"G Saunders","year":"2001","unstructured":"Saunders, G., Hitchens, M., Varadharajan, V.: Role-based access control and the access control matrix. SIGOPS Oper. Syst. Rev. 35(4), 6\u201320 (2001)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"7_CR28","unstructured":"Seufert, S.E.: Die Zugriffskontrolle. Ph.D. thesis, Bamberg, Univ., Diss., (2002)"},{"key":"7_CR29","unstructured":"Vahs, D.: Organisation: Einf\u00fchrung in die Organisationstheorie und -praxis. Sch\u00e4ffer-Poeschel (2007)"},{"key":"7_CR30","series-title":"MC Press Series","volume-title":"Identity Management: A Primer","author":"G Williamson","year":"2009","unstructured":"Williamson, G., Sharoni, I., Yip, D., Spaulding, K.E.: Identity Management: A Primer. MC Press Series. MC Press Online, Big Sandy (2009)"}],"container-title":["Communications in Computer and Information Science","Data Management Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30162-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T12:37:10Z","timestamp":1748781430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30162-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319301617","9783319301624"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30162-4_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}