{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:42:56Z","timestamp":1743115376430,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694702"},{"type":"electronic","value":"9783319694719"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69471-9_35","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T10:03:44Z","timestamp":1508493824000},"page":"468-476","source":"Crossref","is-referenced-by-count":0,"title":["Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment"],"prefix":"10.1007","author":[{"given":"Jianfeng","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yun","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Han","sequence":"additional","affiliation":[]},{"given":"Feilong","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"35_CR1","unstructured":"ANSI.: American national standard for information technology-role based access control, ANSI INCITS 359-2004 (2004)"},{"issue":"9","key":"35_CR2","doi-asserted-by":"crossref","first-page":"2490","DOI":"10.1109\/TC.2014.2375189","volume":"64","author":"D Xu","year":"2015","unstructured":"Xu, D., Kent, M., Thomas, L., et al.: Automated model-based\u00a0testing of\u00a0role-based access control using predicate\/transition nets. IEEE Trans. Comput. 64(9), 2490\u20132505 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Joshi, J.B.D.: UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. In: 13th ACM Symposium on Access Control Models and Technologies, New York, USA, pp. 83\u201392 (2008)","DOI":"10.1145\/1377836.1377850"},{"key":"35_CR4","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.cose.2014.10.003","volume":"48C","author":"J Lu","year":"2015","unstructured":"Lu, J., Joshi, J.B.D., Jin, L., Liu, Y.: Towards complexity analysis of user authorization query problem in RBAC. Comput. Secur. 48C, 116\u2013130 (2015)","journal-title":"Comput. Secur."},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Wickramaarachchi, G.T., Wahbeh, H.Q., Li, N.: An efficient framework for user authorization queries in RBAC systems. In: 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, pp. 23\u201332 (2009)","DOI":"10.1145\/1542207.1542213"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Armando, A., Ranise, S., Turkmen, F., Crispo, B.: Efficient run-time solving of RBAC user authorization queries: pushing the envelope. In: 17th ACM Conference on Data and Application Security and Privacy, San Antonio, Texas, USA, pp. 241\u2013248 (2012)","DOI":"10.1145\/2133601.2133631"},{"key":"35_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/978-3-642-34601-9_39","volume-title":"Network and System Security","author":"N Mousavi","year":"2012","unstructured":"Mousavi, N., Tripunitara, Mahesh V.: Mitigating the intractability of the user authorization query problem in role-based access control (RBAC). In: Xu, L., Bertino, E., Mu, Y. (eds.) NSS 2012. LNCS, vol. 7645, pp. 516\u2013529. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-34601-9_39"},{"key":"35_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/978-3-642-04444-1_42","volume-title":"Computer Security \u2013 ESORICS 2009","author":"L Chen","year":"2009","unstructured":"Chen, L., Crampton, J.: Set covering problems in role-based access control. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 689\u2013704. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-04444-1_42"},{"key":"35_CR9","doi-asserted-by":"publisher","unstructured":"Hu, J., Khan, K. M., Zhang, Y., Bai, Y., Li, R.: Role updating in information systems using model checking. Knowl. Inf. Syst. (2016). doi:\n10.1007\/s10115-016-0974-4","DOI":"10.1007\/s10115-016-0974-4"},{"issue":"6","key":"35_CR10","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TDSC.2010.55","volume":"8","author":"Y Sun","year":"2011","unstructured":"Sun, Y., Wang, Q., Li, N., et al.: On the complexity of authorization in RBAC under qualification and security constraints. IEEE Trans. Dependable Secure Comput. 8(6), 883\u2013897 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"11","key":"35_CR11","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.ipl.2014.06.003","volume":"114","author":"J Lu","year":"2014","unstructured":"Lu, J., Xu, D., Jin, L., Han, J., Peng, H.: On the complexity of role updating feasibility problem in RBAC. Inf. Process. Lett. 114(11), 597\u2013602 (2014)","journal-title":"Inf. Process. Lett."},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Verde, N.V., Vaidya, J., Atluri, V., Colantonio, A.: Role engineering: from theory to practice. In: 2nd ACM Conference on Data and Application Security and Privacy, San Antonio, Texas, USA, pp. 181\u2013192 (2012)","DOI":"10.1145\/2133601.2133624"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Ni, Q., Lobo, J., Calo, S.B., Rohatgi, P., Bertino, E.: Automating role-based provisioning by learning from examples. In: 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, pp. 75\u201384 (2009)","DOI":"10.1145\/1542207.1542222"},{"key":"35_CR14","unstructured":"SAT4\u00a0J: A satisfiability library for Java, January 2006, \nhttp:\/\/www.sat4j.org\/"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69471-9_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T13:11:08Z","timestamp":1508764268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69471-9_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694702","9783319694719"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69471-9_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}