{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:39:11Z","timestamp":1725489551542},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745723"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74573-0_25","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T09:29:07Z","timestamp":1187861347000},"page":"238-247","source":"Crossref","is-referenced-by-count":0,"title":["Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow"],"prefix":"10.1007","author":[{"given":"Tomoya","family":"Enokido","sequence":"first","affiliation":[]},{"given":"Valbona","family":"Barolli","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Takizawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","volume-title":"Concurrency Control and Recovery in Database Systems","author":"P.A. Bernstein","year":"1987","unstructured":"Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1145\/168588.168606","volume-title":"Proc. of the 1st ACM Conf. on Computers and Communication Security","author":"E. Bertino","year":"1993","unstructured":"Bertino, E., Samarati, P., Jaodia, S.: High Assurance Discretionary Access Control in Object Bases. In: Proc. of the 1st ACM Conf. on Computers and Communication Security, pp. 140\u2013150. ACM Press, New York (1993)"},{"key":"25_CR3","first-page":"236","volume-title":"The Proc. of IEEE 18th International Conf. on Advanced Information Networking and Applications (AINA 2004)","author":"R. Chon","year":"2004","unstructured":"Chon, R., Enokido, T., Takizawa, M.: Inter-Role Information Flow in Object-based Systems. In: The Proc. of IEEE 18th International Conf. on Advanced Information Networking and Applications (AINA 2004), pp. 236\u2013343. IEEE Computer Society Press, Los Alamitos (2004)"},{"issue":"5","key":"25_CR4","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM\u00a019(5), 236\u2013343 (1976)","journal-title":"Communications of the ACM"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/ICPADS.2005.112","volume-title":"Proc. of the IEEE 11th International Conference on Parallel and Distributed Systems (ICPADS 2005)","author":"T. Enokido","year":"2005","unstructured":"Enokido, T., Takizawa, M.: Concurrency Control Based-on Significancy on Roles. In: Proc. of the IEEE 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), pp. 196\u2013202. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1109\/AINA.2006.290","volume-title":"Proc. of the IEEE 20th International Conference on Advanced Information Networking and Applications (AINA 2006)","author":"T. Enokido","year":"2006","unstructured":"Enokido, T., Takizawa, M.: Role-Based Concurrency Control for Distributed Systems. In: Proc. of the IEEE 20th International Conference on Advanced Information Networking and Applications (AINA 2006), pp. 407\u2013412. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Enokido, T., Takizawa, M.: Concurrency Control using Subject- and Purpose-Oriented (SPO) View. In: Proc. of the 2nd International Conference on Availability, Reliability and Security (ARES 2007), pp. 454\u2013461 (2007)","DOI":"10.1109\/ARES.2007.60"},{"issue":"19","key":"25_CR8","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1145\/360363.360369","volume":"19","author":"K.P. Eswaran","year":"1976","unstructured":"Eswaran, K.P., Gray, J.N., Lorie, R.A., Traiger, I.L.: The Notions of Consistency and Predicate Locks in a Database System. Communications of the ACM\u00a019(19), 624\u2013633 (1976)","journal-title":"Communications of the ACM"},{"key":"25_CR9","unstructured":"Ferraiolo, D., Kuhn, R.: Role-Based Access Controls. In: Proc. of 15th NIST-NCSC National Computer Security Conf., pp. 554\u2013563 (1992)"},{"key":"25_CR10","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role Based Access Control. In: Artech House (2005)"},{"key":"25_CR11","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-08755-9_9","volume":"60","author":"J. Gray","year":"1978","unstructured":"Gray, J.: Notes on Database Operating Systems. Lecture Notes in Computer Science\u00a060, 393\u2013481 (1978)","journal-title":"Lecture Notes in Computer Science"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/ICPADS.2001.934841","volume-title":"Proc. of IEEE International Conf. on Parallel and Distributed Systems (ICPADS 2001)","author":"K. Izaki","year":"2001","unstructured":"Izaki, K., Tanaka, K., Takizawa, M.: Information Flow Control in Role-Based Model for Distributed Objects. In: Proc. of IEEE International Conf. on Parallel and Distributed Systems (ICPADS 2001), pp. 363\u2013370. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"25_CR13","unstructured":"Oracle Corporation: Oracle8i Concepts, vol. 1, Release 8.1.5 (1999)"},{"issue":"11","key":"25_CR14","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R.S. Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-Based Access Control Models. IEEE Computer\u00a026(11), 9\u201319 (1993)","journal-title":"IEEE Computer"},{"issue":"2","key":"25_CR15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"25_CR16","unstructured":"Sybase. Sybase SQL Server, \n                    \n                      http:\/\/www.sybase.com\/"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/4236.623965","volume":"1","author":"Z. Tari","year":"1997","unstructured":"Tari, Z., Chan, S.W.: A Role-Based Access Control for Intranet Security. IEEE Internet Computing\u00a01, 24\u201334 (1997)","journal-title":"IEEE Internet Computing"},{"issue":"3","key":"25_CR18","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1142\/S0219265904001143","volume":"5","author":"K. Watanabe","year":"2004","unstructured":"Watanabe, K., Sugiyama, Y., Enokido, T., Takizawa, M.: Moderate Concurrency Control in Distributed Object Systems. Journal of Interconnection Networks (JOIN)\u00a05(3), 233\u2013247 (2004)","journal-title":"Journal of Interconnection Networks (JOIN)"}],"container-title":["Lecture Notes in Computer Science","Network-Based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74573-0_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:25:32Z","timestamp":1619519132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74573-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745723"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74573-0_25","relation":{},"subject":[]}}