{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:51:50Z","timestamp":1773330710736,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319480565","type":"print"},{"value":"9783319480572","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_21","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"305-316","source":"Crossref","is-referenced-by-count":9,"title":["Fine Grained Attribute Based Access Control Model for Privacy Protection"],"prefix":"10.1007","author":[{"given":"Que Nguyet Tran","family":"Thi","sequence":"first","affiliation":[]},{"given":"Tran The","family":"Si","sequence":"additional","affiliation":[]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"21_CR1","volume-title":"Access Control for Databases: Concepts and Systems","author":"E Bertino","year":"2011","unstructured":"Bertino, E., Ghinita, G., Kamra, A.: Access Control for Databases: Concepts and Systems. Now Publishers, Hanover (2011)"},{"key":"21_CR2","first-page":"162","volume":"800","author":"VC Hu","year":"2013","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) definition and considerations (draft). NIST Spec. Publ. 800, 162 (2013)","journal-title":"NIST Spec. Publ."},{"key":"21_CR3","first-page":"85","volume":"2","author":"VC Hu","year":"2015","unstructured":"Hu, V.C., Kuhn, D.R., Ferraiolo, D.F.: Attribute-based access control. Computer 2, 85\u201388 (2015)","journal-title":"Computer"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","volume-title":"Data and Applications Security and Privacy XXVI","author":"X Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 41\u201355. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31540-4_4"},{"key":"21_CR5","first-page":"45","volume-title":"Computational Intelligence, Cyber Security and Computational Models","author":"R Sandhu","year":"2013","unstructured":"Sandhu, R.: The future of access control: attributes, automation, and adaptation. In: Sai Sundara Krishnan, G., Anitha Lekshmi, R.S., Senthil Kumar, M., Bonato, A., Gra\u00f1a, M. (eds.) Computational Intelligence, Cyber Security and Computational Models, vol. 246, p. 45. Springer, India (2013)"},{"key":"21_CR6","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Byun, J.-W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies (2005)","DOI":"10.1145\/1063979.1063998"},{"issue":"4","key":"21_CR8","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1007\/s00778-006-0023-0","volume":"17","author":"JW Byun","year":"2008","unstructured":"Byun, J.W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4), 603\u2013619 (2008)","journal-title":"VLDB J."},{"key":"21_CR9","unstructured":"Kabir, M.E., Wang, H.: Conditional purpose based access control model for privacy protection. In: Proceedings of the Twentieth Australasian Conference on Australasian Database, vol. 92, pp. 135\u2013142. Australian Computer Society, Inc. (2009)"},{"issue":"8","key":"21_CR10","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1016\/j.jcss.2014.04.017","volume":"80","author":"H Wang","year":"2014","unstructured":"Wang, H., Sun, L., Bertino, E.: Building access control policy model for privacy preserving and testing policy conflicting problems. J. Comput. Syst. Sci. 80(8), 1493\u20131503 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"21_CR11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-642-15346-4_13","volume-title":"E-Government, E-Services and Global Processes","author":"ME Kabir","year":"2010","unstructured":"Kabir, M.E., Wang, H., Bertino, E.: A role-involved conditional purpose-based access control model. In: Janssen, M., Lamersdorf, W., Pries-Heje, J., Rosemann, M. (eds.) E-Government, E-Services and Global Processes, vol. 334, pp. 167\u2013180. Springer, Heidelberg (2010)"},{"issue":"3","key":"21_CR12","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1016\/j.eswa.2010.07.057","volume":"38","author":"ME Kabir","year":"2011","unstructured":"Kabir, M.E., Wang, H., Bertino, E.: A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3), 1482\u20131489 (2011)","journal-title":"Expert Syst. Appl."},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-74835-9_6","volume-title":"Computer Security \u2013 ESORICS 2007","author":"Q Ni","year":"2007","unstructured":"Ni, Q., Lin, D., Bertino, E., Lobo, J.: Conditional privacy-aware role based access control. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 72\u201389. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74835-9_6"},{"issue":"3","key":"21_CR14","first-page":"24","volume":"13","author":"Q Ni","year":"2010","unstructured":"Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.M., Karat, J., Trombeta, A.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(3), 24 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"11","key":"21_CR15","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1109\/TKDE.2014.2312112","volume":"26","author":"P Colombo","year":"2014","unstructured":"Colombo, P., Ferrari, E.: Enforcement of purpose based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 26(11), 2703\u20132716 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Colombo, P., Ferrari, E.: Enhancing MongoDB with purpose based access control. IEEE Trans. Dependable Secure Comput. (2015, to appear)","DOI":"10.1109\/TDSC.2015.2497680"},{"issue":"8","key":"21_CR17","doi-asserted-by":"crossref","first-page":"2134","DOI":"10.1109\/TKDE.2015.2411595","volume":"27","author":"P Colombo","year":"2015","unstructured":"Colombo, P., Ferrari, E.: Efficient enforcement of action-aware purpose-based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 27(8), 2134\u20132147 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"21_CR18","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1109\/TKDE.2013.71","volume":"26","author":"Z Pervaiz","year":"2014","unstructured":"Pervaiz, Z., Aref, W.G., Ghafoor, A., Prabhu, N.: Accuracy-constrained privacy-preserving access control mechanism for relational data. IEEE Trans. Knowl. Data Eng. 26(4), 795\u2013807 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"21_CR19","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"8","key":"21_CR20","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.cose.2011.08.002","volume":"30","author":"L Fuchs","year":"2011","unstructured":"Fuchs, L., Pernul, G., Sandhu, R.: Roles in information security\u2013a survey and classification of the research area. Comput. Secur. 30(8), 748\u2013769 (2011)","journal-title":"Comput. Secur."},{"issue":"6","key":"21_CR21","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"DR Kuhn","year":"2010","unstructured":"Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. IEEE Comput. 43(6), 79\u201381 (2010)","journal-title":"IEEE Comput."},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Huang, J., Nicol, D.M., Bobba, R., Huh, J.H.: A framework integrating attribute-based policies into role-based access control. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, pp. 187\u2013196. ACM (2012)","DOI":"10.1145\/2295136.2295170"},{"key":"21_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-22906-5_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"QM Rajpoot","year":"2015","unstructured":"Rajpoot, Q.M., Jensen, C.D., Krishnan, R.: Attributes enhanced role-based access control model. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., L\u00f3pez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 3\u201317. Springer, Heidelberg (2015)"},{"issue":"5","key":"21_CR24","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving K-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 571\u2013588 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 133\u2013142 (2008)","DOI":"10.1145\/1377836.1377857"},{"key":"21_CR26","unstructured":"Rissanen, E.: eXtensible Access Control Markup Language (XACML) version 3.0 (committe specification 01). Technical report, OASIS (2010). http:\/\/docs.oasisopen.org\/xacml\/3.0\/xacml-3.0-core-spec-cd-03-en.Pdf"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:51:38Z","timestamp":1498355498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}