{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:41:04Z","timestamp":1743108064413,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694580"},{"type":"electronic","value":"9783319694597"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69459-7_2","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T04:19:29Z","timestamp":1508473169000},"page":"22-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards a JSON-Based Fast Policy Evaluation Framework"],"prefix":"10.1007","author":[{"given":"Hao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Bouabdallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","volume":"18","author":"MR Clarkson","year":"2010","unstructured":"Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18, 1157\u20131210 (2010)","journal-title":"J. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-based Admission Control. IETF, RFC 2753, January 2000","key":"2_CR2","DOI":"10.17487\/rfc2753"},{"doi-asserted-by":"crossref","unstructured":"Borders, K., Zhao, X., Prakash, A.: CPOL: high-performance policy evaluation. In: The 12th ACM Conference on Computer and Communications Security. ACM (2005)","key":"2_CR3","DOI":"10.1145\/1102120.1102142"},{"unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL). IBM Research, March 2003","key":"2_CR4"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1065545.1065547","volume":"8","author":"R Bhatti","year":"2005","unstructured":"Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J.B.: X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(2), 187\u2013227 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"unstructured":"OASIS XACML Technical Committee: eXtensible access control markup language (XACML) Version 3.0. Oasis Standard, OASIS (2013). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html. Last accessed 17 May 2017","key":"2_CR6"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-28641-4_21","volume-title":"Principles of Security and Trust","author":"J Crampton","year":"2012","unstructured":"Crampton, J., Morisset, C.: PTaCL: a language for attribute-based access control in open systems. In: Degano, P., Guttman, J.D. (eds.) POST 2012. LNCS, vol. 7215, pp. 390\u2013409. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-28641-4_21"},{"unstructured":"Crockford, D.: JSON \u2014 The fat-free alternative to XML (vol. 2006). http:\/\/www.json.org\/fatfree.html. Last accessed 17 May 2017","key":"2_CR8"},{"unstructured":"El-Aziz, A.A., Kannan, A.: JSON encryption. In: 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE (2014)","key":"2_CR9"},{"doi-asserted-by":"crossref","unstructured":"Griffin, L., Butler, B., de Leastar, E., Jennings, B., Botvich, D.: On the performance of access control policy evaluation. In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 25\u201332. IEEE (2012)","key":"2_CR10","DOI":"10.1109\/POLICY.2012.15"},{"unstructured":"W3schools: JSON vs. XML. www.w3schools.com\/js\/js_json_xml.asp. Last accessed 24 May 2017","key":"2_CR11"},{"unstructured":"Brossard, D.: JSON Profile of XACML 3.0 Version 1.0. XACML Committee Specification 01, 11 December 2014. http:\/\/docs.oasis-open.org\/xacml\/xacml-json-http\/v1.0\/cs01\/xacml-json-http-v1.0-cs01.pdf. Last accessed 26 May 2017","key":"2_CR12"},{"unstructured":"Steven, D., Bernard, B., Leigh, G.: JSON-encoded ABAC (XACML) policies. FAME project of Waterford Institute of Technology. Presentation to OASIS XACML TC concerning JSON-encoded XACML policies, 30 May 2013","key":"2_CR13"},{"unstructured":"Amazon Web Services: AWS Identity and Access Management (IAM) User Guide. http:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/introduction.html. Last accessed 27 May 2017","key":"2_CR14"},{"unstructured":"Jiang, H., Bouabdallah, A.: JACPoL: a simple but expressive JSON-based access control policy language. In: The 11th WISTP International Conference on Information Security Theory and Practice (WISTP 2017), 28\u201329 September 2017, Heraklion, Crete, Greece. Springer (2017, to appear)","key":"2_CR15"},{"unstructured":"ECMA International: ECMA-404 The JSON Data Interchange Standard. http:\/\/www.json.org\/. Last accessed 27 May 2017","key":"2_CR16"},{"unstructured":"Ferraiolo, D.F., Kuhn, D.R.: Role-based Access Controls, 12 March 2009. arXiv preprint: arXiv:0903.2171","key":"2_CR17"},{"doi-asserted-by":"crossref","unstructured":"Obrsta, L., McCandlessb, D., Ferrella, D.: Fast semantic attribute-role-based access control (ARBAC) in a collaborative environment. In: 2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Pittsburgh, PA, USA, 14\u201317 October 2012","key":"2_CR18","DOI":"10.4108\/icst.collaboratecom.2012.250750"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-642-33704-8_8","volume-title":"Computer Network Security","author":"X Jin","year":"2012","unstructured":"Jin, X., Sandhu, R., Krishnan, R.: RABAC: role-centric attribute-based access control. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 84\u201396. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-33704-8_8"},{"unstructured":"David, F., et al.: Extensible access control markup language (XACML) and next generation access control (NGAC). In: Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. ACM (2016)","key":"2_CR20"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems. OTM 2017 Conferences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69459-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:40:22Z","timestamp":1709818822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-69459-7_2"}},"subtitle":["(Short Paper)"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694580","9783319694597"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69459-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"21 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"OTM Confederated International Conferences \"On the Move to Meaningful Internet Systems\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"otm2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.otmconferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}