{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:12:51Z","timestamp":1751515971408,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763538"},{"type":"electronic","value":"9783319763545"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_32","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T11:43:48Z","timestamp":1520595828000},"page":"350-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Weighted Access Control Policies Cohabitation in Distributed Systems"],"prefix":"10.1007","author":[{"given":"Asmaa","family":"El Kandoussi","sequence":"first","affiliation":[]},{"given":"Hanan","family":"El Bakkali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"issue":"2","key":"32_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996). Arch. Rat. Mech. Anal. 78, 315\u2013333 (1982)","journal-title":"IEEE Comput."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Burnett, C., Chen, L., Edwards, P., Norman, T.J.: TRAAC: trust and risk aware access control. In: Twelfth Annual International Conference on Privacy, Security and Trust, pp. 371\u2013378 (2014)","DOI":"10.1109\/PST.2014.6890962"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Rashid, A., Kim, I.K., Khan, O.A.: Providing authorization interoperability using rule based HL7 RBAC for CDR (Clinical Data Repository) framework. In: Proceedings of the 2015 12th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2015, pp. 343\u2013348 (2015)","DOI":"10.1109\/IBCAST.2015.7058527"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Alshehri, S., Raj, R.K.: Secure access control for health information sharing systems. In: 2013 IEEE International Conference on Healthcare Informatics, pp. 277\u2013286 (2013)","DOI":"10.1109\/ICHI.2013.40"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Chi, H., Jones, E.L., Zhao, L.: Implementation of a security access control model for inter-organizational healthcare information systems. In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, pp. 692\u2013696 (2008)","DOI":"10.1109\/APSCC.2008.256"},{"key":"32_CR6","unstructured":"Bhartiya, S., Mehrotra, D., Girdhar, A.: Proposing hierarchy-similarity based access control framework: a multilevel electronic health record data sharing approach for interoperable environment. J. King Saud Univ. Comput. Inf. Sci. (2015)"},{"key":"32_CR7","unstructured":"Yanhuang, L., Nora, C.B., Jean-Michel, C., Frdric, C., Vincent, F.: Reaching agreement in security policy negotiation"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Elkandoussi, A., Elbakkali, H.: On access control requirements for inter-organizational workflow. In: Proceedings of the 4th Edition of National Security Days (JNS4), pp. 1\u20136 (2014)","DOI":"10.1109\/JNS4.2014.6850128"},{"key":"32_CR9","unstructured":"Deepak, P., Mohsen, A.S., Kotagiri, R., Rajkumar, B.: A taxonomy and survey of fault-tolerant workflow management systems in cloud and distributed computing environments"},{"key":"32_CR10","unstructured":"Sabrina, K., Alessandra, M., Stefan, D.: Access control and the resource description framework: a survey"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Duan, L., Chen, S., Zhang, Y., Liu, R.P.: Automated policy combination for data sharing across multiple organizations. In: IEEE International Conference on Services Computing, pp. 226\u2013233 (2015)","DOI":"10.1109\/SCC.2015.39"},{"issue":"6","key":"32_CR12","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1007\/s11704-016-5503-9","volume":"10","author":"L Lin","year":"2016","unstructured":"Lin, L., Hu, J., Zhang, J.: Packet: a privacy-aware access control policy composition method for services composition in cloud environments. J. Front. Comput. Sci. 10(6), 1142\u20131157 (2016)","journal-title":"J. Front. Comput. Sci."},{"key":"32_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-642-15257-3_20","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"H Wang","year":"2010","unstructured":"Wang, H., Sun, L., Varadharajan, V.: Purpose-based access control policies and conflicting analysis. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) Security and Privacy \u2013 Silver Linings in the Cloud. IFIP Advances in Information and Communication Technology, vol. 330, pp. 217\u2013228. Springer, Heidelberg (2010)"},{"key":"32_CR14","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/TKDE.2012.97","volume":"25","author":"H Hu","year":"2012","unstructured":"Hu, H., Ahn, G.J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25, 1614\u20131627 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Elkandoussi, A., Elbakkali, H., Elhilali, N.: Toward resolving access control policy conflict in inter-organizational workflows. In: 2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp. 2161\u20135330 (2015)","DOI":"10.1109\/AICCSA.2015.7507218"},{"issue":"3","key":"32_CR16","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1007\/s10586-013-0340-1","volume":"17","author":"W Li","year":"2014","unstructured":"Li, W., Wu, J., Zhang, Q., Hu, K., Li, J.: Trust-driven and QoS demand clustering analysis based cloud workflow scheduling strategies. Cluster Comput. 17(3), 1013\u20131030 (2014)","journal-title":"Cluster Comput."},{"issue":"3","key":"32_CR17","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/JSYST.2013.2260072","volume":"8","author":"W Tan","year":"2014","unstructured":"Tan, W., Sun, Y., Li, L.X., Lu, G., Wang, T.: A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst. J. 8(3), 868\u2013878 (2014)","journal-title":"IEEE Syst. J."},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Lin, D., Rao, P., Bertino, E., Lobo, J.: An approach to evaluate policy similarity. In: Proceedings of 12th ACM Symposium on Access Control Models and Technologies, pp. 1\u201310 (2007)","DOI":"10.1145\/1266840.1266842"},{"key":"32_CR19","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.jksuci.2015.08.005","volume":"29","author":"B Shalini","year":"2017","unstructured":"Shalini, B., Deepti, M., Anup, G.: Proposing hierarchy-similarity based access control framework: a multilevel electronic health record data sharing approach for interoperable environment. J. King Saud Univ. Comput. Inf. Sci. 29, 505\u2013519 (2017)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T16:51:50Z","timestamp":1751475110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}