{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T17:40:10Z","timestamp":1751737210916,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319957289"},{"type":"electronic","value":"9783319957296"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95729-6_4","type":"book-chapter","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T13:19:16Z","timestamp":1531142356000},"page":"51-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Enabling the Deployment of ABAC Policies in RBAC Systems"],"prefix":"10.1007","author":[{"given":"Gunjan","family":"Batra","sequence":"first","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,10]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) definition and considerations. In: NIST Special Publication, 800-162 (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-26961-0_5","volume-title":"Information Systems Security","author":"Sadhana Jha","year":"2015","unstructured":"Jha, S., Sural, S., Atluri, V., Vaidya, J.: Enforcing separation of duty in attribute based access control systems. In: ICISS, pp. 61\u201378 (2015)"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-20810-7_5","volume-title":"Data and Applications Security and Privacy XXIX","author":"Emre Uzun","year":"2015","unstructured":"Uzun, E., Lorenzi, D., Atluri, V., Vaidya, J., Sural, S.: Migrating from DAC to RBAC. In: DBSec, pp. 69\u201384 (2015)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Atluri, V., Guo, Q.: The role mining problem: finding a minimal descriptive set of roles. In: SACMAT, pp. 175\u2013184 (2007)","DOI":"10.1145\/1266840.1266870"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Huang, J., Nicol, D., Bobba, R., Huh, J.: A framework integrating attribute-based policies into role-based access control. In: SACMAT, pp. 187\u2013196 (2012)","DOI":"10.1145\/2295136.2295170"},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"Vincent C. Hu","year":"2015","unstructured":"Hu, V., Kuhn, R., Ferraiolo, D.: Attribute-based access control. In: IEEE, pp. 85\u201388 (2015)","journal-title":"Computer"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. In: IEEE Computer, pp. 38\u201347 (1996)","journal-title":"Computer"},{"key":"4_CR8","unstructured":"Fisher, B., Brickman, N., Burden, P., Jha, S., Johnson, B., Keller, A., Kolovos, T., Umarji, S., Weeks, S.: Attribute Based Access Control. In: NIST Special Publication 1800-3 (2017)"},{"key":"4_CR9","first-page":"84","volume-title":"Lecture Notes in Computer Science","author":"Xin Jin","year":"2012","unstructured":"Jin, X., Sandhu, R., Krishnan, R.: RABAC: role-centric attribute-based access control. In: MMM-ACNS, pp. 84\u201396 (2012)"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"D Kuhn","year":"2010","unstructured":"Kuhn, D., Coyne, E., Weil, T.: Adding attributes to role-based access control. IEEE Comput. 43, 79\u201381 (2010)","journal-title":"IEEE Comput."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M., Sandhu, R.: A model for attribute-based user-role assignment. In: IEEE, pp. 353\u2013362 (2002)","DOI":"10.1109\/CSAC.2002.1176307"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Talukdar, T., Batra, G., Vaidya, J., Atluri, V., Sural, S.: Efficient bottom-up mining of attribute based access control policies, pp. 339\u2013348. IEEE (2017)","DOI":"10.1109\/CIC.2017.00051"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95729-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T17:21:34Z","timestamp":1751736094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95729-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319957289","9783319957296"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95729-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergamo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec18.unibg.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}