{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T12:43:43Z","timestamp":1768999423383,"version":"3.49.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319661964","type":"print"},{"value":"9783319661971","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66197-1_3","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T21:02:30Z","timestamp":1502485350000},"page":"35-53","source":"Crossref","is-referenced-by-count":17,"title":["A Complete Generative Label Model for\u00a0Lattice-Based Access Control Models"],"prefix":"10.1007","author":[{"given":"N. V. Narendra","family":"Kumar","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Shyamasundar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,13]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Bell, D., La Padula, L.: Secure computer systems: Unified exposition and multics interpretation. In: Technical Report ESD-TR-75-306, MTR-2997, MITRE, Bedford, Mass (1975)","DOI":"10.21236\/ADA023588"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE SP 1996, pp. 164\u2013173. IEEE Computer Society (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Brewer, D., Nash, M.: The Chinese wall security policy. In: 1989 Proceedings of the IEEE Symposium on Security and Privacy, pp. 206\u2013214, May 1989","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Crampton, J.: On permissions, inheritance and role hierarchies. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS, pp. 85\u201392 (2003)","DOI":"10.1145\/948109.948123"},{"issue":"5","key":"3_CR5","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D Denning","year":"1976","unstructured":"Denning, D.: A lattice model of secure informatiom flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: RFC 2693: SPKI certificate theory. IETF RFC Publication, September 1999","DOI":"10.17487\/rfc2693"},{"key":"3_CR7","unstructured":"Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NIST-NCSC National Computer Security Conference, pp. 554\u2013563 (1992)"},{"issue":"8","key":"3_CR8","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"MA Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19(8), 461\u2013471 (1976)","journal-title":"Commun. ACM"},{"key":"3_CR9","unstructured":"Biba, K.: Integrity considerations for secure computer systems. In: Technical Report ESD-TR-76-372, MITRE, Bedford, Mass (1976)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50472-8","volume-title":"Distributed Computing and Internet Technology","year":"2017","unstructured":"Krishnan, P., Krishna, P.R., Parida, L. (eds.): Distributed Computing and Internet Technology. Lecture Notes in Computer Science, vol. 10109. Springer, Heidelberg (2017). doi: 10.1007\/978-3-319-50472-8"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, N.V.N., Shyamasundar, R.K.: Realizing purpose-based privacy policies succinctly via information-flow labels. In: 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, 3\u20135 December 2014, pp. 753\u2013760. IEEE Computer Society (2014). https:\/\/doi.org\/10.1109\/BDCloud.2014.89","DOI":"10.1109\/BDCloud.2014.89"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, N.V.N., Shyamasundar, R.K.: Analyzing protocol security through information-flow control. In: Krishnan et al. [10], pp. 159\u2013171. https:\/\/doi.org\/10.1007\/978-3-319-50472-8_13","DOI":"10.1007\/978-3-319-50472-8_13"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, N.V.N., Shyamasundar, R.K.: Dynamic labelling to enforce conformance of cross domain security\/privacy policies. In: Krishnan et al. [10], pp. 183\u2013195. https:\/\/doi.org\/10.1007\/978-3-319-50472-8_15","DOI":"10.1007\/978-3-319-50472-8_15"},{"key":"3_CR14","unstructured":"Kumar, N.V.N., Shyamasundar, R.: Decentralized information flow securing method and system for multilevel security and privacy domains, 29 November 2016. https:\/\/www.google.co.in\/patents\/US9507929 , US Patent 9,507,929"},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M Nyanchama","year":"1999","unstructured":"Nyanchama, M., Osborn, S.L.: The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur. 2(1), 3\u201333 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"3_CR16","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2), 85\u2013106 (2000). http:\/\/doi.acm.org\/10.1145\/354876.354878","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"8","key":"3_CR17","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/0167-4048(92)90131-A","volume":"11","author":"RS Sandhu","year":"1992","unstructured":"Sandhu, R.S.: Lattice-based enforcement of Chinese walls. Comput. Secur. 11(8), 753\u2013763 (1992)","journal-title":"Comput. Secur."},{"issue":"11","key":"3_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"RS Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9\u201319 (1993)","journal-title":"Computer"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-61770-1_28","volume-title":"Computer Security \u2014 ESORICS 96","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S.: Role hierarchies and constraints for lattice-based access controls. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 65\u201379. Springer, Heidelberg (1996). doi: 10.1007\/3-540-61770-1_28"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/11805588_11","volume-title":"Data and Applications Security XX","author":"N Tuval","year":"2006","unstructured":"Tuval, N., Gudes, E.: Resolving information flow conflicts in RBAC systems. In: Damiani, E., Liu, P. (eds.) DBSec 2006. LNCS, vol. 4127, pp. 148\u2013162. Springer, Heidelberg (2006). doi: 10.1007\/11805588_11"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66197-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T06:02:51Z","timestamp":1569996171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66197-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319661964","9783319661971"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66197-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}