{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:55:25Z","timestamp":1765230925546},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213055"},{"type":"electronic","value":"9783540247210"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24721-0_13","type":"book-chapter","created":{"date-parts":[[2010,7,28]],"date-time":"2010-07-28T00:15:12Z","timestamp":1280276112000},"page":"180-193","source":"Crossref","is-referenced-by-count":25,"title":["Modeling Role-Based Access Control Using\u00a0Parameterized\u00a0UML\u00a0Models"],"prefix":"10.1007","author":[{"given":"Dae-Kyoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Robert","family":"France","sequence":"additional","affiliation":[]},{"given":"Na","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"13_CR1","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"G.J. Ahn","year":"2000","unstructured":"Ahn, G.J., Sandhu, R.: Role-based Authorization Constraints Specification. ACM Transactions on Information and Systems Security\u00a03(4), 207\u2013226 (2000)","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"13_CR2","unstructured":"Barker, S.: Security Policy Specification in Logic. In: Proceedings of the International Conference on Artificial Intelligence, Las Vegas, NV, pp. 143\u2013148 (2000)"},{"key":"13_CR3","unstructured":"Barker, S., Rosenthal, A.: Flexible Security Policies in SQL. In: Proceedings of the 15th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Niagara-onthe-Lake, Canada (2001)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, pp. 21\u201330 (2000)","DOI":"10.1145\/344287.344298"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Chandramouli, R.: Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks. In: Proceedings of 5th ACM workshop on Role-Based Access Control, Berlin, Germany (July 2000)","DOI":"10.1145\/344287.344297"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Chen, F., Sandhu, R.: Constraints for Role-Based Access Control. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD (1995)","DOI":"10.1145\/270152.270177"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N.: The Ponder Policy Specification Language. In: Proceedings of the Policy Workshop, Bristol, U.K. (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security\u00a04(3) (August 2001)","DOI":"10.1145\/501978.501980"},{"key":"13_CR9","unstructured":"Georg, G., France, R., Ray, I.: An Aspect-Based Approach to Modeling Security Concerns. In: Proceedings of the Workshop on Critical Systems Development with UML, Dresden, Germany (2002)"},{"key":"13_CR10","volume-title":"Proceedings of the Interational Conference on Engineering Complex Computing Systems (ICECCS 2002)","author":"G. Georg","year":"2002","unstructured":"Georg, G., Ray, I., France, R.: Using Aspects to Design a Secure System. In: Proceedings of the Interational Conference on Engineering Complex Computing Systems (ICECCS 2002), Greenbelt, MD, December 2002. ACM Press, New York (2002)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Hayton, R.J., Bacon, J.M., Moody, K.: Access Control in Open Distributed Environment. In: IEEE Symposium on Security and Privacy, Oakland, CA, May 1998, pp. 3\u201314 (1998)","DOI":"10.1109\/SECPRI.1998.674819"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Hitchens, M., Varadarajan, V.: Tower: A Language for Role-Based Access Control. In: Proceedings of the Policy Workshop, Bristol, U.K. (2001)","DOI":"10.1007\/3-540-44569-2_6"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Hoagland, J.A., Pandey, R., Levitt, K.N.: Security Policy Specification Using a Graphical Approach. Technical Report CSE-98-3, Computer Science Department, University of California Davis (July 1998)","DOI":"10.1016\/S0167-4048(98)80010-1"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 31\u201342 (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Proceedings of Fifth International Conference on the Unified Modeling Language, Dresden, Germany, October 2002, pp. 412\u2013425 (2002)","DOI":"10.1007\/3-540-45800-X_32"},{"key":"13_CR16","volume-title":"Proceedings of the Interational Conference on Engineering Complex Computing Systems (ICECCS 2002)","author":"D.-K. Kim","year":"2002","unstructured":"Kim, D.-K., France, R., Ghosh, S., Song, E.: Using Role-Based Modeling Language (RBML) as Precise Characterizations of Model Families. In: Proceedings of the Interational Conference on Engineering Complex Computing Systems (ICECCS 2002), Greenbelt, MD, December 2002. ACM Press, New York (2002)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Proceedings of Fifth International Conference on the Unified Modeling Language, Dresden, Germany, October 2002, pp. 426\u2013441 (2002)","DOI":"10.1007\/3-540-45800-X_33"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Graph Theory - ECCV 1998","author":"B.T. Messmer","year":"1998","unstructured":"Messmer, B.T., Bunke, H.: Subgraph Isomorphism in Polynomial Time. In: Graph Theory - ECCV 1998. LNCS. Springer, Heidelberg (1998)"},{"key":"13_CR19","unstructured":"OASIS. XACML Language Proposal, Version 0.8. Technical report, Organization for the Advancement of Structured Information Standards (January 2002), Available electronically from: http:\/\/www.oasis-open.org\/committees\/xacml"},{"key":"13_CR20","unstructured":"Ribeiro, C., Zuquete, A., Ferreira, P.: SPL: An Access Control Language for Security Policies with Complex Constraints. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, CA (February 2001)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Tidswell, J.E., Jaeger, T.: An Access Control Model for Simplifying Constraint Expression. In: Proceedings of 7th ACM conference on Computer and communications security, Athens, Greese, November 2000, pp. 154\u2013163 (2000)","DOI":"10.1145\/352600.352622"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24721-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T18:11:20Z","timestamp":1591553480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24721-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213055","9783540247210"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24721-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}