{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:45:10Z","timestamp":1762623910903},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319655208"},{"type":"electronic","value":"9783319655215"}],"license":[{"start":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T00:00:00Z","timestamp":1503532800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-65521-5_7","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T22:33:50Z","timestamp":1503441230000},"page":"78-90","source":"Crossref","is-referenced-by-count":10,"title":["Energy-Efficient Role Ordering Scheduler"],"prefix":"10.1007","author":[{"given":"Tomoya","family":"Enokido","sequence":"first","affiliation":[]},{"given":"Dilawaer","family":"Duolikun","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Takizawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,24]]},"reference":[{"key":"7_CR1","unstructured":"Object Management Group Inc.: Common object request broker architecture (CORBA) specification, version 3.3, part 1 \u2013 interfaces (2012). \nhttp:\/\/www.omg.org\/spec\/CORBA\/3.3\/Interfaces\/PDF"},{"key":"7_CR2","volume-title":"Concurrency Control and Recovery in Database Systems","author":"PA Bernstein","year":"1987","unstructured":"Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Boston (1987)"},{"key":"7_CR3","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role based access control. Artech House (2005)"},{"issue":"11","key":"7_CR4","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"RS Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26(11), 9\u201319 (1993)","journal-title":"IEEE Comput."},{"issue":"2","key":"7_CR5","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"7_CR6","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/4236.623965","volume":"1","author":"Z Tari","year":"1997","unstructured":"Tari, Z., Chan, S.W.: A role-based access control for intranet security. IEEE Internet Comput. 1, 24\u201334 (1997)","journal-title":"IEEE Internet Comput."},{"key":"7_CR7","volume-title":"Cryptography and Data Security","author":"DE Denning","year":"1982","unstructured":"Denning, D.E., Denning, P.J.: Cryptography and Data Security. Addison-Wesley Publishing Company, Boston (1982)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Gray, J.N.: Notes on database operating systems. Lecture Notes in Computer Science, vol. 60, pp. 393\u2013481 (1978)","DOI":"10.1007\/3-540-08755-9_9"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Sawada, A., Kataoka, H., Duolikun, D., Enokido, T., Takizawa, M.: Energy-aware clusters of servers for storage and computation applications. In: Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), pp. 400\u2013407 (2016)","DOI":"10.1109\/AINA.2016.157"},{"issue":"4","key":"7_CR10","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1142\/S021926590600179X","volume":"7","author":"T Enokido","year":"2006","unstructured":"Enokido, T.: Role-based serializability using role ordering schedulers. J. Interconnect. Netw. 7(4), 437\u2013450 (2006)","journal-title":"J. Interconnect. Netw."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Network-Based Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65521-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T22:36:55Z","timestamp":1503441415000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65521-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,24]]},"ISBN":["9783319655208","9783319655215"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65521-5_7","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,8,24]]}}}