{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:00Z","timestamp":1725574380111},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235781"},{"type":"electronic","value":"9783540302070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30207-0_54","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T20:51:21Z","timestamp":1294433481000},"page":"430-436","source":"Crossref","is-referenced-by-count":3,"title":["Context-Aware Role-Based Access Control Model for Web Services"],"prefix":"10.1007","author":[{"given":"Xu","family":"Feng","sequence":"first","affiliation":[]},{"given":"Xie","family":"Jun","sequence":"additional","affiliation":[]},{"given":"Huang","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Xie","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"54_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC)\u00a04(3) (August 2001)","DOI":"10.1145\/501978.501980"},{"issue":"4","key":"54_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/4236.865085","volume":"4","author":"J. Park","year":"2000","unstructured":"Park, J., Sandhu, R.: Secure Cookies on the Web. IEEE Internet Computing\u00a04(4), 36\u201345 (2000)","journal-title":"IEEE Internet Computing"},{"key":"54_CR4","unstructured":"OASIS Standard. Security Assertion Markup Language, SAML1.1 (October 2003), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/security\/docs\/cs-sstc-core-01.pdf"},{"key":"54_CR5","unstructured":"OASIS Standard. XACML 1.0 Specification Set (February 2003), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"key":"54_CR6","unstructured":"ContentGuard, Inc. eXtensible Rights Markup Language, XrML 2.0. (2001), \n                    \n                      http:\/\/www.xrml.org"},{"key":"54_CR7","unstructured":"Web Services Security (WS-Security) version1.005 (April 2002), \n                    \n                      http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-secure\/"},{"key":"54_CR8","unstructured":"Web Services Security Core Specification Working Draft 01, September 20 (2002). \n                    \n                      http:\/\/lists.oasis-open.org\/archives\/wss\/200209\/pdf00000.pdf"},{"key":"54_CR9","unstructured":"W3C NOTE. SOAP Security Extensions: Digital Signature, \n                    \n                      http:\/\/www.w3.org\/TR\/SOAP-dsig"},{"key":"54_CR10","unstructured":"Bhatti, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Access Control in Dynamic XML-based Web-Services with X-RBAC. In: Accepted for publication in The First International Conference on Web Services, Las Vegas, June 23-26 (2003)"},{"issue":"1-6","key":"54_CR11","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/S1389-1286(00)00053-0","volume":"33","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., de Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Design and implementation of an access control processor for XML documents. Computer Networks: The International Journal of Computer and Telecommunications Networking\u00a033(1-6), 59\u201375 (2000)","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"issue":"2","key":"54_CR12","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. ACM Transactions on Information and System Security (TISSEC)\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"54_CR13","unstructured":"Feng, X., Guoyuan, L., Hao, H.: A Survey on Access Control for Web Services. Accepted for publication in Computer Science (in Chinese)"},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"Feng, X., Guoyuan, L., Hao, H., Li, X.: Role-Based Access Control System for Web Services. Accepted for publication in The 2004 International Conference on Computer and Information Technology, Wuhan, China, September 14-16 (2004)","DOI":"10.1109\/CIT.2004.1357221"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30207-0_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:55:23Z","timestamp":1620014123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30207-0_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235781","9783540302070"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30207-0_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}