{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:46:40Z","timestamp":1725565600798},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540224181"},{"type":"electronic","value":"9783540277729"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27772-9_10","type":"book-chapter","created":{"date-parts":[[2010,9,15]],"date-time":"2010-09-15T21:37:11Z","timestamp":1284586631000},"page":"87-96","source":"Crossref","is-referenced-by-count":4,"title":["Effective Web-Related Resource Security Using Distributed Role Hierarchy"],"prefix":"10.1007","author":[{"given":"Gunhee","family":"Lee","sequence":"first","affiliation":[]},{"given":"Wonil","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dong-kyoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hongjin","family":"Yeh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Ferraiolo, D., Kuhn, R.: Role-Based Access Control. In: Proceedings of 15th National Computer Security Conference, Balmy, Baltimore, USA (1992)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Kuhn, R.: An Introduction To Role-Based Access Control. NIST\/ITL Bulletin. NIST (1995)","DOI":"10.1145\/270152.270165"},{"issue":"2","key":"10_CR3","first-page":"1","volume":"1","author":"D. Ferraiolo","year":"1999","unstructured":"Ferraiolo, D., Barkley, J., Kuhn, D.: A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information Systems Security\u00a01(2), 1\u201330 (1999)","journal-title":"ACM Transactions on Information Systems Security"},{"key":"10_CR4","unstructured":"Barkley, J., Kuhn, D., Rosenthal, L., Skall, M., Cincotta, A.: Role-Based Access Control for the Web. In: CALS Expo International & 21st Century Commerce 1998: Global Business Solutions for the New Millennium (1998)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Freudenthal, E., Pesin, T., Port, L.: dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (2002)","DOI":"10.1109\/ICDCS.2002.1022279"},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R. Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and System Security\u00a02(1), 105\u2013135 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"10_CR7","unstructured":"Bauer, L., Schneider, M., Felten, E.: A General and Flexible Access-Control System for the Web. In: Proceedings of the 11th USENIX Security Symposium (2002)"},{"key":"10_CR8","unstructured":"Ungureanu, V., Vesuna, F., Minsky, N.: A Policy-Based Access Control Mechanism for the Coporate Web. In: 16th Annual Computer Security Applications Conference (2000)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Sirer, E., Wang, K.: An Access Control Language for Web Services. In: Proceedings of 7th ACM SACMAT, pp. 23\u201332 (2002)","DOI":"10.1145\/507711.507715"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer, IEEE, 38\u201347 (1996)","DOI":"10.1109\/2.485845"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, E., Kuhn, D., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-45518-3_16","volume-title":"Middleware 2001","author":"J. Bacon","year":"2001","unstructured":"Bacon, J., Moody, K., Yao, W.: Access Control and Trust in the use of Widely Distributed Services. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, pp. 300\u2013315. Springer, Heidelberg (2001)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Tari, Z., Chan, S.: A Role-based Access Control for Intranet Security. IEEE Internet Computing, 24\u201334 (1997)","DOI":"10.1109\/4236.623965"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/319171.319172","volume-title":"Proceedings of the 4th ACM workshop on Role-based Access Control","author":"J. Park","year":"1999","unstructured":"Park, J., Sandhu, R.: Proceedings of the 4th ACM workshop on Role-based Access Control. In: Proceedings of the 4th ACM workshop on Role-based Access Control, pp. 1\u20139. ACM Press, New York (1999)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Ahn, G., Sandhu, R., Kang, M., Park, J.: Injecting RBAC to Secure a Web-based Workflow System. In: Proceedings of the Fifth ACM Workshop on Role-based Access Control, pp. 1\u201310 (2000)","DOI":"10.1145\/344287.344295"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27772-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:19:26Z","timestamp":1605759566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27772-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540224181","9783540277729"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27772-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}