{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:34:27Z","timestamp":1725557667263},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408062"},{"type":"electronic","value":"9783540452270"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45227-0_89","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:57:53Z","timestamp":1277236673000},"page":"917-926","source":"Crossref","is-referenced-by-count":5,"title":["Decentralized Temporal Authorization Administration"],"prefix":"10.1007","author":[{"given":"Chun","family":"Ruan","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"89_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0004-3702(84)90008-0","volume":"23","author":"J.F. Allen","year":"1984","unstructured":"Allen, J.F.: Towards a general theory of action and time. Artificial Intelligence\u00a023, 123\u2013154 (1984)","journal-title":"Artificial Intelligence"},{"key":"89_CR2","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1007\/3-540-44957-4_87","volume-title":"Computational Logic - CL 2000","author":"S. Barker","year":"2000","unstructured":"Barker, S.: Data protection by logic programming. In: Palamidessi, C., Moniz Pereira, L., Lloyd, J.W., Dahl, V., Furbach, U., Kerber, M., Lau, K.-K., Sagiv, Y., Stuckey, P.J. (eds.) CL 2000. LNCS (LNAI), vol.\u00a01861, pp. 1300\u20131314. Springer, Heidelberg (2000)"},{"issue":"1","key":"89_CR3","first-page":"67","volume":"8","author":"E. Bertino","year":"1996","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: A temporal access control mechanism for database systems. IEEE Trans. on KDE\u00a08(1), 67\u201380 (1996)","journal-title":"IEEE Trans. on KDE"},{"issue":"3","key":"89_CR4","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. on Information and System Security\u00a04(3), 191\u2013233 (2001)","journal-title":"ACM Trans. on Information and System Security"},{"key":"89_CR5","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF03037169","volume":"9","author":"M. Gelfond","year":"1991","unstructured":"Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Generation Computing\u00a09, 365\u2013385 (1991)","journal-title":"New Generation Computing"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45227-0_89","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T21:52:26Z","timestamp":1552600346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45227-0_89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408062","9783540452270"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45227-0_89","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}