{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:01Z","timestamp":1725572041173},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_4","type":"book-chapter","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T04:16:22Z","timestamp":1292559382000},"page":"22-38","source":"Crossref","is-referenced-by-count":5,"title":["Issues in the Design of a Language for Role Based Access Control"],"prefix":"10.1007","author":[{"given":"Michael","family":"Hitchens","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Bai, Y., Varadharajan, V.: A Logic for State Transformations in Authorisation Policies. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop, pp. 173\u2013183 (1997)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Brewer, D., Nash, M.: The Chinese Wall Security Policy. IEEE Proceedings on Security and Privacy, 206\u2013214 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"4_CR3","unstructured":"Ferraiolo, D., Kuhn, R.: Role based Access Controls. In: 15th NIST-NCSC National Computer Security Conference (1992)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Giuri, L., Iglio, P.: Role Templates for Content-Based Access Control. In: 2nd ACM RBAC Workshop, pp. 153\u2013159 (1997)","DOI":"10.1145\/266741.266773"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Goh, C.: Towards a more Complete Model of Role. In: 3rd ACM RBAC Workshop, pp. 55\u201361 (1998)","DOI":"10.1145\/286884.286898"},{"key":"4_CR6","unstructured":"Hilchenbach, B.: Observations on the Real-World Implementation of Role-Based Access Control. In: National Information Systems Security Conference, pp. 341\u2013352 (1997)"},{"key":"4_CR7","unstructured":"Hitchens, M., Varadharajan, V.: Specifying Role Based Access Control Policies for Object Systems (submitted for publication)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Jajodia S., Smarati, P., Subrahmanian, V.: A Logical Language for Expressing Authorizations. IEEE Proceedings on Security and Information Privacy (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Karger, P.: Implementing Commercial Data Integrity with Secure Capabilities. In: IEEE Symposium on Security and Privacy, pp. 130\u2013139 (1988)","DOI":"10.1109\/SECPRI.1988.8105"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Lupu E., Sloman, M.: Reconciling Role Based Management and Role Based Access control. In: 2nd ACM RBAC Workshop, pp. 135\u2013141 (1997)","DOI":"10.1145\/266741.266770"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Moffett, J.: Control Principles and Role Hierarchies. In: 3rd ACM RBAC Workshop, pp. 63\u201369 (1998)","DOI":"10.1145\/286884.286900"},{"key":"4_CR12","unstructured":"Object Management Group (OMG) : Security Services in Common Object Request Broker Architecture (1996)"},{"key":"4_CR13","unstructured":"Object Management Group (OMG), CORBAservices: Common Object Services Specification, OMG Document 97-07-04 (1997)"},{"key":"4_CR14","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"1997","unstructured":"Pfleeger, C.P.: Security in Computing, 2nd edn. Prentice-Hall, Englewood Cliffs (1997)","edition":"2"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Transaction Control Expressions For Separation of Duties. In: Fourth Aerospace Computer Security Applications Conference, pp. 282\u2013286 (1988)","DOI":"10.1109\/ACSAC.1988.113349"},{"key":"4_CR16","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"11","author":"R. Sandhu","year":"1993","unstructured":"Sandhu, R.: Lattice-Based Access Control Models. IEEE Computer\u00a011, 9\u201319 (1993)","journal-title":"IEEE Computer"},{"key":"4_CR17","unstructured":"Sandhu, R., Feinstein, H.: A Three Tier Architecture for Role-Based Access Control. In: 17th National Computer Security Conference, pp. 34\u201346 (1994)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control: A Multi- Dimensional View. In: 10th Annual Computer Security Applications Conference, pp. 54\u201361 (1994)","DOI":"10.1109\/CSAC.1994.367293"},{"key":"4_CR19","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"2","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L.: Role based Access Control Models. IEEE Computer\u00a02, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Role Activation Hierarchies. In: 3rd ACM RBAC Workshop, pp. 33\u201340 (1998)","DOI":"10.1145\/286884.286891"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Simon, R., Zurko, M.: Separation of Duty in Role-Based Environments. In: 10th Computer Security Foundations Workshop, pp. 183\u2013194 (1997)","DOI":"10.1109\/CSFW.1997.596811"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Varadharajan, V., Allen, P., Black, S.: Analysis of Proxy Problem in Distributed Systems. IEEE Proceedings on Security and Privacy (1991)","DOI":"10.1109\/RISP.1991.130793"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Varadharajan, V., Allen, P.: Joint Action based Authorisation Schemes. ACM Operating Systems Review\u00a07 (1996)","DOI":"10.1145\/230908.230915"},{"key":"4_CR24","unstructured":"Varadharajan, V., Crall, C., Pato, J.: Authorisation for Enterprise wide Distributed Systems: Design and Application. In: IEEE Computer Security Applications Conference (1998)"},{"key":"4_CR25","unstructured":"Zurko, M., Simon, R., Sanfilippo, T.: A User-Centred, Modular Authorisation Service Built on an RBAC Foundation. In: IEEE Symposium on Security and Privacy (1999)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T04:46:18Z","timestamp":1559882778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}