{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:34:51Z","timestamp":1761323691671},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_13","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"144-155","source":"Crossref","is-referenced-by-count":22,"title":["Conformance Checking of RBAC Policy and its Implementation"],"prefix":"10.1007","author":[{"given":"Frode","family":"Hansen","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Oleshchuk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House (2003)","key":"13_CR1"},{"key":"13_CR2","volume-title":"The Spin Model Checker","author":"G. Holzmann","year":"2004","unstructured":"Holzmann, G.: The Spin Model Checker. Addison-Wesley, Massachusetts (2004)"},{"doi-asserted-by":"crossref","unstructured":"Giuri, L., Iglio, P.: A formal model for role-based access control with constraints. In: 9th IEEE Computer Security Foundations Workshop, pp. 136\u2013145 (1996)","key":"13_CR3","DOI":"10.1109\/CSFW.1996.503698"},{"doi-asserted-by":"crossref","unstructured":"Simon, R., Zurko, M.E.: Separation of duty in role-based environments. In: 10th IEEE Computer Security Foundations Workshop, pp. 183\u2013194 (1997)","key":"13_CR4","DOI":"10.1109\/CSFW.1997.596811"},{"doi-asserted-by":"crossref","unstructured":"Kuhn, D.R.: Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In: 2nd ACM workshop on Role-based access control, pp. 23\u201330 (1997)","key":"13_CR5","DOI":"10.1145\/266741.266749"},{"doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Gavrila, S.I., Ferraiolo, D.: On the formal definition of separation-of-duty policies and their composition. In: IEEE Symp. Sec. Priv., pp. 172\u2013183 (1998)","key":"13_CR6","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M. Nyanchama","year":"1999","unstructured":"Nyanchama, M., Osborn, S.: The role graph model and conflict of interest. ACM Trans. Inf. Syst. Sec.\u00a02, 3\u201333 (1999)","journal-title":"ACM Trans. Inf. Syst. Sec."},{"doi-asserted-by":"crossref","unstructured":"Hansen, F., Oleshchuk, V.: Spatial role-based access control model for wireless networks. In: IEEE Vehicular Technology Conf., vol.\u00a03, pp. 2093\u20132097 (2003)","key":"13_CR8","DOI":"10.1109\/VETECF.2003.1285394"},{"unstructured":"Hansen, F., Oleshchuk, V.: SRBAC: A spatial role-based access control model for mobile systems. In: 7th Nordic Workshop on Secure IT Systems, pp. 129\u2013141 (2003)","key":"13_CR9"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-based Access Control Model. ACM Trans. Inf. Syst. Sec.\u00a04, 191\u2013223 (2001)","journal-title":"ACM Trans. Inf. Syst. Sec."},{"unstructured":"Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: Generalized Temporal Role Based Access Control Model (GTRBAC). Technical report, CERIAS TR 2001-47, Purdue University, USA (2001)","key":"13_CR11"},{"doi-asserted-by":"crossref","unstructured":"Clark, D.R., Wilson, D.R.: A comparison of commercial and military computer security policies. In: IEEE Symp. Sec. Priv., pp. 184\u2013194 (1987)","key":"13_CR12","DOI":"10.1109\/SP.1987.10001"},{"doi-asserted-by":"crossref","unstructured":"Nash, M.J., Poland, K.R.: Some conundrums concerning separation of duty. In: IEEE Symp. Sec. Priv., pp. 201\u2013209 (1990)","key":"13_CR13","DOI":"10.1109\/RISP.1990.63851"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:44:27Z","timestamp":1620013467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}