{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:01:05Z","timestamp":1740096065452,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_14","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T09:27:19Z","timestamp":1181035639000},"page":"162-176","source":"Crossref","is-referenced-by-count":14,"title":["Formalization of RBAC Policy with Object Class Hierarchy"],"prefix":"10.1007","author":[{"given":"Jung Hwa","family":"Chae","sequence":"first","affiliation":[]},{"given":"Nematollaah","family":"Shiri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., et al.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"1","author":"D.F. Ferraiolo","year":"1999","unstructured":"Ferraiolo, D.F., Barkely, J.F., Kuhn, D.R.: A role based access control model and reference implementation within a corporate Intranet. ACM Trans. Inf. Syst. Secur (USA)\u00a01(2), 34\u201364 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur. (USA)"},{"key":"14_CR3","unstructured":"Barkely, J.F., et al.: Role based access control for the world wide web. In: NIST 20th National Computer Security Conference, pp. 331\u2013340 (1997)"},{"issue":"3","key":"14_CR4","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/545186.545191","volume":"5","author":"M. Koch","year":"2002","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur (USA)\u00a05(3), 332\u2013365 (2002), \n                    \n                      http:\/\/dx.doi.org\/10.1145\/545186.545191","journal-title":"ACM Trans. Inf. Syst. Secur. (USA)"},{"key":"14_CR5","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"F. Baader","year":"2003","unstructured":"Baader, F., et al.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2003)"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/LICS.2002.1029843","volume-title":"Proceedings 17th Annual IEEE Symposium on Logic in Computer Science","author":"D. Calvanese","year":"2002","unstructured":"Calvanese, D., De Giacomo, G., Lenzerini, M.: Description logics: foundations for class-based knowledge representation. In: Proceedings 17th Annual IEEE Symposium on Logic in Computer Science, pp. 359\u2013370. IEEE Computer Society Press, Los Alamitos (2002), \n                    \n                      http:\/\/dx.doi.org\/10.1109\/LICS.2002.1029843"},{"issue":"1","key":"14_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1013882326814","volume":"69","author":"F. Baader","year":"2001","unstructured":"Baader, F., Sattler, U.: An overview of tableau algorithms for description logics. Stud. Log (Netherlands)\u00a069(1), 5\u201340 (2001), \n                    \n                      http:\/\/dx.doi.org\/10.1023\/A:1013882326814","journal-title":"Stud. Log. (Netherlands)"},{"key":"14_CR8","unstructured":"Donini, F.M., et al.: Principles of Knowledge Representation, Studies in Logic, Language and Information, p. 198. CSLI Publications (1996)"},{"issue":"2-3","key":"14_CR9","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","volume":"2","author":"T.Y.C. Woo","year":"1993","unstructured":"Woo, T.Y.C., Lam, S.S.: Authorization in distributed systems: a new approach. J. Comput. Secur (Netherlands)\u00a02(2-3), 107\u2013136 (1993)","journal-title":"J. Comput. Secur. (Netherlands)"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., et al.: Flexible support for multiple access control policies. ACM Trans. Database Syst (USA)\u00a026(2), 214\u2013260 (2001), \n                    \n                      http:\/\/dx.doi.org\/10.1145\/383891.383894","journal-title":"ACM Trans. Database Syst. (USA)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/BFb0035639","volume-title":"Qualitative and Quantitative Practical Reasoning","author":"F. Massacci","year":"1997","unstructured":"Massacci, F.: Reasoning about security: A logic and a decision method for role-based access control. In: Nonnengart, A., et al. (eds.) FAPR 1997 and ECSQARU 1997. LNCS, vol.\u00a01244, p. 421. Springer, Heidelberg (1997)"},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., et al.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst (USA)\u00a015(4), 706\u2013734 (1993), \n                    \n                      http:\/\/dx.doi.org\/10.1145\/155183.155225","journal-title":"ACM Trans. Program. Lang. Syst. (USA)"},{"issue":"1","key":"14_CR13","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/103140.103144","volume":"16","author":"F. Rabitti","year":"1991","unstructured":"Rabitti, F., et al.: A model of authorization for next-generation database systems. ACM Trans. Database Syst (USA)\u00a016(1), 88\u2013131 (1991), \n                    \n                      http:\/\/dx.doi.org\/10.1145\/103140.103144","journal-title":"ACM Trans. Database Syst. (USA)"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., et al.: A logical framework for reasoning about access control models. ACM Trans. Inf. Syst. Secur (USA)\u00a06(1), 71\u2013127 (2003), \n                    \n                      http:\/\/dx.doi.org\/10.1145\/605434.605437","journal-title":"ACM Trans. Inf. Syst. Secur. (USA)"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/11560647_25","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2005","author":"C. Zhao","year":"2005","unstructured":"Zhao, C., et al.: Representation and reasoning on RBAC: a description logic approach. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.\u00a03722, pp. 381\u2013393. Springer, Heidelberg (2005)"},{"issue":"9","key":"14_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R.S. Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994), \n                    \n                      http:\/\/dx.doi.org\/10.1109\/35.312842","journal-title":"IEEE Communications Magazine"},{"key":"14_CR17","unstructured":"Ferraiolo, D.E., Cugini, J.A., Kuhn, D.R.: Role-based access control (RBAC): features and motivations. In: Proceedings of 11th Annual Computer Security Applications Conference, pp. 241\u2013248 (1995)"},{"issue":"3","key":"14_CR18","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., et al.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (USA)\u00a04(3), 224\u2013274 (2001), \n                    \n                      http:\/\/dx.doi.org\/10.1145\/501978.501980","journal-title":"ACM Trans. Inf. Syst. Secur. (USA)"},{"key":"14_CR19","unstructured":"Horrocks, I., Sattler, U.: Description logics, basics, applications, and more (2002), Retrieved from \n                    \n                      http:\/\/www.cs.man.ac.uk\/~horrocks\/Slides\/ecai-handout.pdf"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:29:17Z","timestamp":1605763757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_14","relation":{},"subject":[]}}