{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:48Z","timestamp":1725550008644},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240754"},{"type":"electronic","value":"9783540305552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30555-2_39","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T08:35:49Z","timestamp":1268382949000},"page":"336-345","source":"Crossref","is-referenced-by-count":0,"title":["A Flexible Authorization Framework for E-Commerce"],"prefix":"10.1007","author":[{"given":"Sushil","family":"Jajodia","sequence":"first","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"K.R. Apt","year":"1988","unstructured":"Apt, K.R., Blair, H., Walker, A.: Towards a theory of declarative knowledge. In: Minker, J. (ed.) Foundations of Deductive Databases and Logic Programming, Morgan Kaufmann, San Francisco (1988)"},{"issue":"4","key":"39_CR2","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"G.-J. Ahn","year":"2000","unstructured":"Ahn, G.-J., Sandhu, R.: Role-based authorization constraints specification. ACM Transactions on Information and Systems Security\u00a03(4), 207\u2013226 (2000)","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Obligation monitoring in policy management. In: Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), June 2002, pp. 2\u201312 (2002)","DOI":"10.1109\/POLICY.2002.1011288"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Provisions and obligations in policy rule management and security applications. In: Proc. 28th International Conference on Very Large Data Bases, August 2002, pp. 502\u2013513 (2002)","DOI":"10.1016\/B978-155860869-6\/50051-2"},{"key":"39_CR5","first-page":"99","volume-title":"Database Security V: Status and Prospects","author":"H. Bruggemann","year":"1992","unstructured":"Bruggemann, H.: Rights in an object-oriented environment. In: Landwehr, C., Jajodia, S. (eds.) Database Security V: Status and Prospects, pp. 99\u2013115. North-Holland, Amsterdam (1992)"},{"key":"39_CR6","volume-title":"Database Security","author":"S. Castano","year":"1994","unstructured":"Castano, S., Fugini, M., Samarati, P.: Database Security. Addison-Wesley, Wokingham (1994)"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Dobson, J., McDermid, J.: A framework for expressing models of security policy. In: Proceedings of IEEE Symposium on Security and Privacy, May 1989, pp. 229\u2013239 (1989)","DOI":"10.1109\/SECPRI.1989.36297"},{"key":"39_CR8","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-1-4615-1467-1_8","volume-title":"E-Commerce Security and Privacy","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Kudo, M., Subrahmanian, V.S.: Provisional authorizations. In: Ghosh, A. (ed.) E-Commerce Security and Privacy, pp. 133\u2013159. Kluwer Academic Press, Boston (2001)"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 31\u201342 (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"issue":"2","key":"39_CR10","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Kudo, M., Hada, S.: Xml document security based on provisional authorizations. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, November 2000, pp. 87\u201396 (2000)","DOI":"10.1145\/352600.352613"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Wijesekera, D., Jajodia, S.: Obtaining constraint-compliant authorization lists within the flexible authorization framework. Submitted for publication (February 2003)","DOI":"10.4018\/978-1-59140-186-5.ch004"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Wijesekera, D., Jajodia, S., Parisi-Presicce, F., Hagstrom, A.: Removing permissions in the flexible authorization framework. ACM Transactions on Database Systems (2003)","DOI":"10.1145\/937598.937599"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30555-2_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,24]],"date-time":"2021-10-24T15:21:41Z","timestamp":1635088901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30555-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240754","9783540305552"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30555-2_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}