{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T19:53:41Z","timestamp":1762458821346},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253617"},{"type":"electronic","value":"9783540319702"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31970-2_18","type":"book-chapter","created":{"date-parts":[[2010,7,9]],"date-time":"2010-07-09T17:12:58Z","timestamp":1278695578000},"page":"225-237","source":"Crossref","is-referenced-by-count":29,"title":["Policies, Models, and Languages for Access Control"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Apache http server version 2.0., http:\/\/www.apache.org\/docs-2.0\/misc\/tutorials.html"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bettini, C., Jajodia, S., Wang, S., Wijesekera, D.: Provisions and obligations in policy rule management and security applications. In: Proc. 28th International Conference on Very Large Data Bases, Hong Kong, China (August 2002)","DOI":"10.1016\/B978-155860869-6\/50051-2"},{"key":"18_CR3","series-title":"LNCS State-ofthe- Art series","volume-title":"Secure Internet Programming: Issues in Distributed and Mobile Object Systems","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Secure Internet Programming: Issues in Distributed and Mobile Object Systems. LNCS State-ofthe- Art series. Springer, Heidelberg (1998)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. of the 1996 IEEE Symposiumon Security and Privacy, Oakland, CA, USA (May 1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Transactions on Information and System Security\u00a05(1), 1\u201335 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3","key":"18_CR6","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the web. Journal of Computer Security\u00a010(3), 241\u2013272 (2002)","journal-title":"Journal of Computer Security"},{"key":"18_CR7","unstructured":"Box, D., et al.: Web services policy framework (WS-Policy) version 1.1 (May 2003), http:\/\/msdn.microsoft.com\/library\/en-us\/dnglobspec\/html\/ws-policy.asp"},{"issue":"3","key":"18_CR8","first-page":"706","volume":"2","author":"Y.-H. Chu","year":"1997","unstructured":"Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: Referee: trust management forweb applications. World Wide Web Journal\u00a02(3), 706\u2013734 (1997)","journal-title":"World Wide Web Journal"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending policy languages to the semantic web. In: Proc. of the International Conference on Web Engineering, Munich, Germany (July 2004)","DOI":"10.1007\/978-3-540-27834-4_41"},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC)\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"18_CR11","volume-title":"An Introduction to Database Systems","author":"C.J. Date","year":"1995","unstructured":"Date, C.J.: An Introduction to Database Systems, 6th edn. Addison-Wesley, Reading (1995)","edition":"6"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: Proc. of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"issue":"5","key":"18_CR13","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1145\/365151.365169","volume":"22","author":"A. Dovier","year":"2000","unstructured":"Dovier, A., Piazza, C., Pontelli, E., Rossi, G.: Sets and constraints logic programming. ACM Transactions of Programming Languages and Systems\u00a022(5), 861\u2013931 (2000)","journal-title":"ACM Transactions of Programming Languages and Systems"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An internet attribute certificate profile for authorization. RFC 3281 (April 2002)","DOI":"10.17487\/rfc3281"},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/69.277771","volume":"6","author":"E.B. Fernandez","year":"1994","unstructured":"Fernandez, E.B., Gudes, E., Song, H.: A model for evaluation and administration of security in object-oriented databases. IEEE Transaction on Knowledge and Data Engineering\u00a06(2), 275\u2013292 (1994)","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"18_CR16","first-page":"1070","volume-title":"Proc. of the 5th International Conference and Symposium on Logic Programming","author":"M. Gelfond","year":"1988","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proc. of the 5th International Conference and Symposium on Logic Programming, pp. 1070\u20131080. MIT Press, Cambridge (1988)"},{"key":"18_CR17","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-1-4615-1467-1_8","volume-title":"E-Commerce Security and Privacy","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Kudo, M., Subrahmanian, V.S.: Provisional authorizations. In: Ghosh, A. (ed.) E-Commerce Security and Privacy, pp. 133\u2013159. Kluwer Academic Publishers, Boston (2001)"},{"issue":"2","key":"18_CR18","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Jim, T.: Sd3: A trust management system with certified evaluation. In: Proc. of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 2001)","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"18_CR20","unstructured":"Kudoh, M., Hirayama, Y., Hada, S., Vollschwitz, A.: Access control specification based on policy evaluation and enforcement model and specification language. In: Symposium on Cryptograpy and Information Security, SCIS 2000 (2000)"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/356850.356852","volume":"13","author":"C.E. Landwehr","year":"1981","unstructured":"Landwehr, C.E.: Formal models for computer security. ACM Computing Surveys\u00a013(3), 247\u2013278 (1981)","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"18_CR22","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust-management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"18_CR24","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA (May 2002)"},{"key":"18_CR25","unstructured":"Lunt, T.: Access control policies: Some unanswered questions. In: IEEE Computer Security Foundations Workshop II, Franconia, NH, June 1988, pp. 227\u2013245 (1988)"},{"key":"18_CR26","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) Version 1.0 (2003), http:\/\/www.oasis-open.org\/committees\/xacml"},{"key":"18_CR27","unstructured":"OASIS. Security Assertion Markup Language (SAML) V1.1 (2003), http:\/\/www.oasis-open.org\/committees\/security\/"},{"key":"18_CR28","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 (2004), http:\/\/www.oasis-open.org\/committees\/xacml"},{"issue":"1","key":"18_CR29","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/103140.103144","volume":"16","author":"F. Rabitti","year":"1991","unstructured":"Rabitti, F., Bertino, E., Kim, W., Woelk, D.: A model of authorization for next-generation database systems. ACM TODS\u00a016(1), 89\u2013131 (1991)","journal-title":"ACM TODS"},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, p. 137. Springer, Heidelberg (2001)"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA (June 2002)","DOI":"10.1109\/POLICY.2002.1011295"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Shen, H., Dewan, P.: Access control for collaborative environments. In: Proc. Int. Conf. on Computer Supported Cooperative Work, November 1992, pp. 51\u201358 (1992)","DOI":"10.1145\/143457.143461"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA (October 2004)","DOI":"10.1145\/1029133.1029140"},{"issue":"2","key":"18_CR34","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/762476.762481","volume":"6","author":"D. Wijesekera","year":"2003","unstructured":"Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Transactions on Information and System Security\u00a06(2), 286\u2013325 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"18_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security\u00a06, 1\u201342 (2003)","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Lecture Notes in Computer Science","Databases in Networked Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31970-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T23:17:23Z","timestamp":1559258243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31970-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253617","9783540319702"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31970-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}