{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:52:34Z","timestamp":1725861154567},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319422930"},{"type":"electronic","value":"9783319422947"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42294-7_61","type":"book-chapter","created":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T15:00:47Z","timestamp":1468249247000},"page":"682-690","source":"Crossref","is-referenced-by-count":0,"title":["XACML Policy Optimization Algorithm Based on Venn Diagram"],"prefix":"10.1007","author":[{"given":"Qiuru","family":"Lu","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Haiying","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Weixu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"key":"61_CR1","unstructured":"Extensible Access Control Markup Language (XACML) v3.0 (2012)"},{"key":"61_CR2","unstructured":"Sun XACML. http:\/\/sunxacml.sourceforge.net\/"},{"key":"61_CR3","unstructured":"Enterprise XACML. http:\/\/code.google.com\/p\/enterprise-java-xacml\/"},{"issue":"12","key":"61_CR4","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/TC.2010.274","volume":"60","author":"AX Liu","year":"2011","unstructured":"Liu, A.X., Chen, F., Hwang, J.H.: Designing fast and scalable XACML policy evaluation engines. IEEE Trans. Comput. 60(12), 1802\u20131817 (2011)","journal-title":"IEEE Trans. Comput."},{"key":"61_CR5","doi-asserted-by":"crossref","first-page":"323","DOI":"10.3724\/SP.J.1001.2011.03707","volume":"22","author":"YZ Wang","year":"2011","unstructured":"Wang, Y.Z., Feng, D.G., Zhang, L.W., Zhang, M.: XACML policy evaluation engine based on multi-level optimization technology. J. Softw. 22, 323\u2013338 (2011)","journal-title":"J. Softw."},{"issue":"8","key":"61_CR6","first-page":"206","volume":"35","author":"DH Niu","year":"2014","unstructured":"Niu, D.H., Ma, J.F., Ma, Z.: HPEngine: high performance XACML policy evaluation engine based on statistical analysis. J. Commun. 35(8), 206\u2013215 (2014)","journal-title":"J. Commun."},{"key":"61_CR7","doi-asserted-by":"crossref","unstructured":"Butler, B., Jennings, B., Botvich, D.: XACML policy performance evaluation using a flexible load testing framework. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 648\u2013650. ACM (2010)","DOI":"10.1145\/1866307.1866385"},{"key":"61_CR8","doi-asserted-by":"crossref","unstructured":"Kolovski, V., Hendler, J., Parsia, B.: Analyzing web access control policies. In: Proceedings of the 16th International Conference on World Wide Web, pp. 677\u2013686. ACM (2007)","DOI":"10.1145\/1242572.1242664"},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A.: Verification and change-impact analysis of access-control policies. In: 27th International Conference on IEEE Software Engineering, pp. 196\u2013205 (2005)","DOI":"10.1109\/ICSE.2005.1553562"},{"issue":"1","key":"61_CR10","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.eswa.2014.07.031","volume":"42","author":"A Mourad","year":"2015","unstructured":"Mourad, A., Jebbaoui, H.: SBA-XACML: set-based approach providing efficient policy decision process for accessing web services. Expert Syst. Appl. 42(1), 165\u2013178 (2015)","journal-title":"Expert Syst. Appl."},{"key":"61_CR11","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.compeleceng.2014.12.012","volume":"44","author":"H Jebbaoui","year":"2015","unstructured":"Jebbaoui, H., Mourad, A., Otrok, H.: Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies. Comput. Electr. Eng. 44, 91\u2013103 (2015)","journal-title":"Comput. Electr. Eng."},{"key":"61_CR12","unstructured":"Mourad, A., Tout, H., Talhi, C.: From model-driven specification to design-level set-based analysis of XACML policies. Comput. Electr. Eng., 1\u201315 (2015)"},{"issue":"3","key":"61_CR13","first-page":"516","volume":"32","author":"YZ Wang","year":"2009","unstructured":"Wang, Y.Z., Feng, D.G.: A conflict and redundancy analysis method for XACML rules. J. Comput. 32(3), 516\u2013530 (2009)","journal-title":"J. Comput."},{"issue":"3","key":"61_CR14","first-page":"900","volume":"30","author":"WH Chen","year":"2013","unstructured":"Chen, W.H., Wang, N.N.: Research on XACML policy evaluation optimization technology. Appl. Res. Comput. 30(3), 900\u2013905 (2013)","journal-title":"Appl. Res. Comput."},{"issue":"2","key":"61_CR15","first-page":"187","volume":"39","author":"Y Qi","year":"2015","unstructured":"Qi, Y., Chen, J., Li, Q.M.: XACML policy evaluation optimization method based on reordering. J. Nanjing Univ. Sci. Technol. 39(2), 187\u2013193 (2015)","journal-title":"J. Nanjing Univ. Sci. Technol."},{"issue":"4","key":"61_CR16","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TSC.2010.28","volume":"4","author":"S Marouf","year":"2012","unstructured":"Marouf, S., Shehab, M., Squicciarini, A.: Adaptive reordering and clustering-based framework for efficient XACML policy evaluation. IEEE Trans. Serv. Comput. 4(4), 300\u2013313 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"61_CR17","unstructured":"XACML 2.0 Conformance Test. http:\/\/www.oasis-open.org\/committees\/download.php\/14846\/xacml2.0-ct-v.0.4.zip"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42294-7_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T18:11:57Z","timestamp":1498327917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42294-7_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319422930","9783319422947"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42294-7_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}