{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:10:06Z","timestamp":1751501406168,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319777023"},{"type":"electronic","value":"9783319777030"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77703-0_103","type":"book-chapter","created":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T11:53:05Z","timestamp":1521892385000},"page":"1060-1070","source":"Crossref","is-referenced-by-count":5,"title":["Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions"],"prefix":"10.1007","author":[{"given":"Iman","family":"Ben Abdelkrim","sequence":"first","affiliation":[]},{"given":"Amine","family":"Baina","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Feltus","sequence":"additional","affiliation":[]},{"given":"Jocelyn","family":"Aubert","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Bellafkih","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Khadraoui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"103_CR1","doi-asserted-by":"crossref","unstructured":"Kalam, A.A.E., et al.: Organization based access control. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003, pp. 120\u2013131 (2003)","DOI":"10.1109\/POLICY.2003.1206966"},{"issue":"3","key":"103_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2016","key":"103_CR3","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.procs.2017.05.438","volume":"109","author":"J Aubert","year":"2017","unstructured":"Aubert, J., Feltus, C., Kostakis, A., Khadraoui, D.: Smart-X: an adaptive multi-agent platform for smart-topics. Procedia Comput. Sci. 109(2016), 943\u2013948 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"103_CR4","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Ege, A.: Modelling contexts in the Or-BAC model. In: 19th Annual Computer Security Applications Conference, Las Vegas (2003)","DOI":"10.1109\/CSAC.2003.1254346"},{"key":"103_CR5","unstructured":"Kalam, A.A.E., Deswarte, Y.: MultiOrBAC: a new access control model for distributed, heterogeneous and collaborative systems. In: IEEE Symposium on Systems and Information Security, Sao Paulo, Brazil (2006)"},{"issue":"4","key":"103_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ijcip.2009.08.005","volume":"2","author":"AAE Kalam","year":"2009","unstructured":"Kalam, A.A.E., Deswarte, Y., Ba\u00efna, A., Ka\u00e2niche, M.: PolyOrBAC: a security framework for critical infrastructures. Int. J. Crit. Infrastruct. Prot. 2(4), 154\u2013169 (2009)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"103_CR7","first-page":"189","volume-title":"Collaborative Access Control for Critical Infrastructures","author":"A Baina","year":"2008","unstructured":"Baina, A., Kalam, A.A.E., Deswarte, Y., Kaaniche, M.: Collaborative Access Control for Critical Infrastructures, pp. 189\u2013201. Springer, Boston (2008)"},{"key":"103_CR8","doi-asserted-by":"crossref","unstructured":"Ben Abdelkrim, I., Baina, A., Bellafkih, M.: Automation of access control negotiation in dynamic coalitions for electrical critical infrastructures. In: 2016 International Conference on Electrical and Information Technologies (ICEIT), pp. 349\u2013354 (2016)","DOI":"10.1109\/EITech.2016.7519619"},{"key":"103_CR9","doi-asserted-by":"crossref","unstructured":"Phillips, C.E., Demurjian, S.A., Ting, T.C.: Towards information assurance for dynamic coalitions. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 87\u201396 (2002)","DOI":"10.1145\/507711.507726"},{"key":"103_CR10","doi-asserted-by":"crossref","unstructured":"Shands, D., Yee, R., Jacobs, J., Sebes, E.J.: Secure virtual enclaves: supporting coalition use of distributed application technologies. In: Proceedings DARPA Information Survivability Conference and Exposition. DISCEX 2000, vol. 1, pp. 335\u2013350 (2002)","DOI":"10.1109\/DISCEX.2000.825037"},{"key":"103_CR11","first-page":"188","volume-title":"On the Negotiation of Access Control Policies","author":"VD Gligor","year":"2002","unstructured":"Gligor, V.D., Khurana, H., Koleva, R.K., Bharadwaj, V.G., Baras, J.S.: On the Negotiation of Access Control Policies, pp. 188\u2013201. Springer, Heidelberg (2002)"},{"key":"103_CR12","unstructured":"Khurana, H., Gligor, V.D.: A model for access negotiations in dynamic coalitions. In: 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 205\u2013210 (2004)"},{"key":"103_CR13","doi-asserted-by":"crossref","unstructured":"Khurana, H., et al.: Integrated security services for dynamic coalitions. In: Proceedings DARPA Information Survivability Conference and Exposition, vol. 2, pp. 38\u201340 (2003)","DOI":"10.1109\/DISCEX.2003.1194908"},{"key":"103_CR14","doi-asserted-by":"crossref","unstructured":"Woo, J.W., Hwang, M.J., Lee, C.G., Youn, H.Y.: Dynamic role-based access control with trust-satisfaction and reputation for multi-agent system. In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, pp. 1121\u20131126 (2010)","DOI":"10.1109\/WAINA.2010.63"},{"key":"103_CR15","doi-asserted-by":"crossref","unstructured":"Feltus, C., Khadraoui, D., Aubert, J.: A security decision-reaction architecture for heterogeneous distributed network. In: International Conference on Availability, Reliability, and Security, ARES 2010, pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/ARES.2010.57"},{"key":"103_CR16","unstructured":"Bellifemine, F., Poggi, A., Rimassa, G.: JADE \u2013 a FIPA-compliant agent framework. In: Proceedings of PAAM 1999, no. 97\u2013108, p. 33 (1999)"}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77703-0_103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T23:41:15Z","timestamp":1751499675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77703-0_103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319777023","9783319777030"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77703-0_103","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}