{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:19:32Z","timestamp":1742998772377,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319484716"},{"type":"electronic","value":"9783319484723"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48472-3_54","type":"book-chapter","created":{"date-parts":[[2016,10,17]],"date-time":"2016-10-17T04:43:13Z","timestamp":1476679393000},"page":"865-882","source":"Crossref","is-referenced-by-count":0,"title":["A Discretionary Delegation Framework for Access Control Systems"],"prefix":"10.1007","author":[{"given":"M. Fahim Ferdous","family":"Khan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ken","family":"Sakamura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,10,18]]},"reference":[{"key":"54_CR1","unstructured":"National Computer Security Center: A guide to understanding discretionary access control in trusted systems. Report NSCD-TG-003 Version 1 (1987)"},{"key":"54_CR2","unstructured":"Department of Defense (1985) Trusted computer system evaluation criteria. DoD 5200.28-STD, National Computer Security Center, USA"},{"issue":"2","key":"54_CR3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"54_CR4","unstructured":"Caumanns, J., Kuhlisch, R., Pfaff, O., Rode, O.: IHE IT infrastructure technical framework white paper \u2013 access control. http:\/\/www.ihe.net\/Technical_Framework\/upload\/IHE_ITI_TF_WhitePaper_AccessControl_2009-09-28.pdf (2009)"},{"key":"54_CR5","unstructured":"Health Level Seven International: HL7 implementation guide for CDA\u00ae release 2: digital signatures and delegation of rights, release 1. http:\/\/www.hl7.org\/implement\/standards\/product_brief.cfm?product_id=375 (2014)"},{"issue":"6","key":"54_CR6","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/40.977753","volume":"21","author":"K Sakamura","year":"2001","unstructured":"Sakamura, K., Koshizuka, N.: The eTRON wide-area distributed-system architecture for e-commerce. IEEE Micro 21(6), 7\u201312 (2001)","journal-title":"IEEE Micro"},{"key":"54_CR7","doi-asserted-by":"crossref","DOI":"10.1002\/9780470511954","volume-title":"Smart card applications: design models for using and programming smart cards","author":"W Rankl","year":"2007","unstructured":"Rankl, W.: Smart card applications: design models for using and programming smart cards, 3rd edn. John Wiley & Sons Ltd., West Sussex (2007)","edition":"3"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Yashiro, T., Khan, M.F.F., Ito, S., Bessho, M., Kobayashi, S., Usaka, T., Koshizuka, N., Sakamura, K.: eTNet: a smart card network architecture for flexible electronic commerce services. In: 4th IFIP International Conference on New Technologies, Mobility and Security, pp. 1\u20135 (2011)","DOI":"10.1109\/NTMS.2011.5720616"},{"key":"54_CR9","unstructured":"Karp, A.H., Haury, H., Davis, M.H.: From ABAC to ZBAC: the evolution of access control models. Technical Report HPL-2009-30, HP Labs. http:\/\/www.hpl.hp.com\/techreports\/2009\/HPL-2009-30.pdf (2009)"},{"key":"54_CR10","unstructured":"Barka, E., Sandhu, R.: A role-based delegation model and some extensions. In: Proceedings of National Information Systems Security Conference, pp. 101\u2013114 (2000)"},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Barka, E., Sandhu, R.: Role-based delegation model\/hierarchical roles. In: Proceedings of Computer Security Applications Conference, pp. 396\u2013404 (2004)","DOI":"10.1109\/CSAC.2004.31"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, L., Ahn, G., Chu, B.T.: A rule-based framework for role based delegation. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, pp. 53\u2013162 (2001)","DOI":"10.1145\/373256.373289"},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, X., Oh, S., Sandhu, R.: PBDM: a flexible delegation model in RBAC. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 149\u2013157 (2003)","DOI":"10.1145\/775412.775431"},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"Hasebe, K., Mabuchi, M., Matsushita, A.: Capability-based delegation model in RBAC. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, pp. 109\u2013118 (2010)","DOI":"10.1145\/1809842.1809861"},{"issue":"12","key":"54_CR15","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/2.970591","volume":"34","author":"L Kagal","year":"2001","unstructured":"Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. IEEE Comput. 34(12), 154\u2013157 (2001)","journal-title":"IEEE Comput."},{"key":"54_CR16","unstructured":"Steffen, R., Knorr, R.: A trust-based delegation system for managing access control. In: Adjunct Proceedings, 3rd International Conference on Pervavise Computing. http:\/\/www.pervasive.ifi.lmu.de\/adjunct-proceedings\/poster\/p001-005.pdf (2005)"},{"key":"54_CR17","unstructured":"YRP Ubiquitous Networking Laboratory: Programming manual of eTRON client library (2007)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2016 Conferences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48472-3_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:19:17Z","timestamp":1498339157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48472-3_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319484716","9783319484723"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48472-3_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}