{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:39:09Z","timestamp":1725500349093},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_19","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"266-276","source":"Crossref","is-referenced-by-count":0,"title":["Authorization Constraints Specification of RBAC"],"prefix":"10.1007","author":[{"given":"Lilong","family":"Han","sequence":"first","affiliation":[]},{"given":"Qingtan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zongkai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","first-page":"39","volume-title":"Proceedings of the First ACM Workshop on Role-Based Access Control","author":"F. Chen","year":"1995","unstructured":"Chen, F., Sandhu, R.S.: Constraints for Role-based Access Control. In: Proceedings of the First ACM Workshop on Role-Based Access Control, pp. 39\u201346. ACM Press, New York (1995)"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/319171.319176","volume-title":"Proceedings of 4th ACM Workshop on Role-Based Access Control","author":"G.J. Ahn","year":"1999","unstructured":"Ahn, G.J., Sandh, R.: The RSL99 Language for Role-based Separation of Duty Constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control, pp. 43\u201354. ACM Press, New York (1999)"},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/CSFW.1996.503698","volume-title":"Proceedings of 9th IEEE Workshop on Computer Security Foundations","author":"L. Giuri","year":"1996","unstructured":"Giuri, L., Iglio, P.: A Formal Model for Role-based Access Control with Constraints. In: Proceedings of 9th IEEE Workshop on Computer Security Foundations, pp. 136\u2013145. IEEE Press, Piscataway, NJ (1996)"},{"key":"19_CR4","first-page":"172","volume-title":"Proceedings of the 1998 IEEE Computer Society Symposium on Research in Security and Privacy","author":"V.D. Gligor","year":"1998","unstructured":"Gligor, V.D., Gavrila, S., Ferraiolo, D.: On the Formal Definition of Separation-of-duty Policies and Their Composition. In: Proceedings of the 1998 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 172\u2013183. IEEE Computer Society Press, Los Alamitos, CA (1998)"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/319171.319175","volume-title":"Proceedings of 4th ACM Workshop on Role-Based Access Control","author":"T. Jaeger","year":"1999","unstructured":"Jaeger, T.: On the Increasing Importance of Constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control, pp. 33\u201342. ACM Press, New York (1999)"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. Inf. Syst. Secur.\u00a03(2) (2000)","DOI":"10.1145\/354876.354878"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:36:05Z","timestamp":1551360965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}