{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:21:13Z","timestamp":1738387273561,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540699712"},{"type":"electronic","value":"9783540705000"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70500-0_29","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"391-403","source":"Crossref","is-referenced-by-count":10,"title":["Advanced Permission-Role Relationship in Role-Based Access Control"],"prefix":"10.1007","author":[{"given":"Min","family":"Li","sequence":"first","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ashley","family":"Plank","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Yong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: Specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security\u00a02(1) (February 1999)","DOI":"10.1145\/300830.300837"},{"key":"29_CR2","unstructured":"Feinstein, H.L., et al.: Small Business Innovation Research (SBIR): Role-Based Access Control: Phase 1, McLean, VA, SETA Corporation (January 20, 1995)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Barkley, J.F., Richard Kuhn, D.: A role based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security\u00a02(1) ( February 1999)","DOI":"10.1145\/300830.300834"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Barkley, J.F.: Specifying and Managing Role-Based Access Control Within a Corporate Intranet. In: Proc.of the 2ed ACM Workshop on Role-Based Access Control, pp. 77\u201382 (1997)","DOI":"10.1145\/266741.266761"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-49649-1_21","volume-title":"Proc. of Asiacrypt 1998","author":"Y. Frankel","year":"1998","unstructured":"Frankel, Y., Tsiounis, Y., Yung, M.: Fair off-line e-cash made Easy. in Advance in Cryptology. In: Proc. of Asiacrypt 1998. LNCS, vol.\u00a01294, pp. 257\u2013270. Springer, Heidelberg (1998)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Gavrila, S.T., Ferraiolo, D.: On the formal denition of separation-of-duty policies and their composition. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 172\u2013183 (May 1998)","DOI":"10.1109\/SECPRI.1998.674833"},{"issue":"1","key":"29_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M. Nyanchama","year":"1999","unstructured":"Nyanchama, M., Osborn, S.: The Role Graph Model and Conflict of Internet. ACM Transaction on Information and System Security\u00a02(1), 3\u201333 (1999)","journal-title":"ACM Transaction on Information and System Security"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1007\/3-540-44750-4_35","volume-title":"Advances in Cryptology-CRYPTO 1995","author":"Okamoto","year":"1995","unstructured":"Okamoto.: On efficient divisible electronic cash scheme. In: Advances in Cryptology-CRYPTO 1995. LNCS, vol.\u00a0963, pp. 438\u2013451. Springer, Heidelberg (1995)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321. MIT Laboratory for Computer Science and RSA DATA Security Inc. (April 1992)","DOI":"10.17487\/rfc1321"},{"issue":"2","key":"29_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"1","author":"R. Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Transaction on Information and System Security\u00a01(2), 105\u2013135 (1999)","journal-title":"ACM Transaction on Information and System Security"},{"key":"29_CR11","first-page":"229","volume-title":"The Annual Computer Security Applications Conference","author":"R. Sandhu","year":"1999","unstructured":"Sandhu, R., Munawer, Q.: The ARBAC99 Model for Administration of Roles. In: The Annual Computer Security Applications Conference, pp. 229\u2013238. ACM Press, New York (1999)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Wang, H., Cao, J.: Delegating revocations and authorizations. In: 1st International Workshop on Collaborative Business Processes, Brisbane, Australia (2007)","DOI":"10.1007\/978-3-540-78238-4_29"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Wang, H., Cao, J., Kambayashi, Y.: Building a Consumer Anonymity Scalable Payment Protocol for the Internet Purchases. In: The 12th International Workshop on Research Issues on Data Engineering: Engineering E-Commerce\/E-Business Systems, San Jose, USA, February 25-26, 2002, pp. 159\u2013168 (2002)","DOI":"10.1109\/RIDE.2002.995110"},{"key":"29_CR14","unstructured":"Wang, H., Cao, J., Zhang, Y.: Formal authorization approaches for permission-role assignment using relational algebra operations. In: Proceedings of the 14th Australasian Database Conference, Adelaide, Australia, February 2-7, 2003, vol.\u00a025(1), pp. 125\u2013134 (2003)"},{"key":"29_CR15","unstructured":"Wang, H., Cao, J., Zhang, Y.: Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. In: The 3rd International Conference on Web Information Systems Engineering (WISE 2002), Singapore, December 3-6, 2002, pp. 301\u2013310 (2002)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Zurko, M., Simon, R., Sanlippo, T.: A user-centered modular authorization service built on an rbac foundation. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oak-land, CA, pp. 57\u201371 (May 1999)","DOI":"10.1109\/SECPRI.1999.766718"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70500-0_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T12:11:24Z","timestamp":1738325484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70500-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540699712","9783540705000"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70500-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}