{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:41:06Z","timestamp":1725864066119},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319458700"},{"type":"electronic","value":"9783319458717"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_14","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T08:25:24Z","timestamp":1472113524000},"page":"218-230","source":"Crossref","is-referenced-by-count":5,"title":["Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control"],"prefix":"10.1007","author":[{"given":"Prosunjit","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"issue":"3","key":"14_CR1","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. TISSEC 4(3), 191\u2013233 (2001)","journal-title":"TISSEC"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: Proceedings of 10th SACMAT, pp. 29\u201337. ACM (2005)","DOI":"10.1145\/1063979.1063985"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Galdi, C., Torres, D.: ERBAC: event-driven RBAC. In: Proceedings of 18th SACMAT, pp. 125\u2013136. ACM (2013)","DOI":"10.1145\/2462410.2462415"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Crampton, J.: Understanding and developing role-based administrative models. In: Proceedings of 12th ACM CCS, pp. 158\u2013167 (2005)","DOI":"10.1145\/1102120.1102143"},{"issue":"2","key":"14_CR5","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/762476.762478","volume":"6","author":"J Crampton","year":"2003","unstructured":"Crampton, J., Loizou, G.: Administrative scope: a foundation for role-based administrative models. ACM TISSEC 6(2), 201\u2013231 (2003)","journal-title":"ACM TISSEC"},{"issue":"3","key":"14_CR6","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM TISSEC 4(3), 224\u2013274 (2001)","journal-title":"ACM TISSEC"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Kern, A.: Advanced features for enterprise-wide role-based access control. In: Proceedings of 18th ACSAC, pp. 333\u2013342. IEEE (2002)","DOI":"10.1109\/CSAC.2002.1176305"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Kern, A., Schaad, A., Moffett, J.: An administration concept for the enterprise role-based access control model. In: Proceedings of 8th ACM SACMAT, pp. 3\u201311 (2003)","DOI":"10.1145\/775412.775414"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Kuijper, W., Ermolaev, V.: Sorting out role based access control. In: Proceedings of 19th ACM SACMAT, pp. 63\u201374 (2014)","DOI":"10.1145\/2613087.2613101"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Li, N., Mao, Z.: Administration in role-based access control. In: Proceedings of 2nd ACM ASIACCS, pp. 127\u2013138 (2007)","DOI":"10.1145\/1229285.1229305"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Neumann, G., Strembeck, M.: A scenario-driven role engineering process for functional RBAC roles. In: Proceedings of 7th ACM SACMAT, pp. 33\u201342 (2002)","DOI":"10.1145\/507711.507717"},{"issue":"6","key":"14_CR12","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","volume":"28","author":"S Oh","year":"2003","unstructured":"Oh, S., Park, S.: Task-role-based access control model. Inf. Syst. 28(6), 533\u2013562 (2003)","journal-title":"Inf. Syst."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Oh, S., Sandhu, R.: A model for role administration using organization structure. In: Proceedings of 7th ACM SACMAT, pp. 155\u2013162 (2002)","DOI":"10.1145\/507711.507737"},{"key":"14_CR14","unstructured":"Sandhu, R.: The ASCAA principles for next-generation role-based access control. In: Proceedings of 3rd ARES (2008)"},{"issue":"1","key":"14_CR15","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM TISSEC 2(1), 105\u2013135 (1999)","journal-title":"ACM TISSEC"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Munawer, Q.: The ARBAC99 model for administration of roles. In: Proceedings of 15th Annual ACSAC, pp. 229\u2013238. IEEE (1999)","DOI":"10.1109\/CSAC.1999.816032"},{"issue":"2","key":"14_CR17","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"14_CR18","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/1-4020-8070-0_22","volume-title":"Data and Applications Security XVII","author":"H Wang","year":"2004","unstructured":"Wang, H., Osborn, S.L.: An administrative model for role graphs. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds.) Data and Applications Security XVII. IFIP, vol. 142, pp. 302\u2013315. Springer, New York (2004)"},{"issue":"8","key":"14_CR19","first-page":"1518","volume":"80","author":"L Zhou","year":"2014","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Secure administration of cryptographic role-based access control for large-scale cloud storage systems. JCSS 80(8), 1518\u20131533 (2014)","journal-title":"JCSS"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:21:12Z","timestamp":1498339272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}