{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:55:36Z","timestamp":1743040536100,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540899846"},{"type":"electronic","value":"9783540899853"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89985-3_69","type":"book-chapter","created":{"date-parts":[[2008,11,21]],"date-time":"2008-11-21T22:39:50Z","timestamp":1227307190000},"page":"559-568","source":"Crossref","is-referenced-by-count":1,"title":["A Temporal Semantic-Based Access Control Model"],"prefix":"10.1007","author":[{"given":"Ali","family":"Noorollahi Ravari","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., Vimercati, S.C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 137\u2013196. Springer, Heidelberg (2001)"},{"key":"69_CR2","unstructured":"Javanmardi, S., Amini, A., Jalili, R.: An Access Control Model for Protecting Semantic Web Resources. In: Web Policy Workshop, Ahens, GA, USA (2006)"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bettini, C., Samarati, P.: A temporal authorization model. In: Second ACM Conference on Computer and Communications Security, Fairfax, Va (1994)","DOI":"10.1145\/191177.191202"},{"key":"69_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1007\/11762256_51","volume-title":"The Semantic Web: Research and Applications","author":"P.A. Bonatti","year":"2006","unstructured":"Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic web policies: a discussion of requirements and research issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol.\u00a04011, pp. 712\u2013724. Springer, Heidelberg (2006)"},{"key":"69_CR5","doi-asserted-by":"crossref","unstructured":"Rabitti, F., Bertino, E., Kim, W., Woelk, D.: A Model of Authorization for Next-Generation Database Systems. ACM TODS\u00a016 (1991)","DOI":"10.1145\/103140.103144"},{"key":"69_CR6","doi-asserted-by":"crossref","unstructured":"Qin, L., Atluri, V.: Concept-level access control for the Semantic Web. In: 2003 ACM workshop on XML security (2003)","DOI":"10.1145\/968559.968575"},{"key":"69_CR7","unstructured":"Javanmardi, S., Amini, A., Jalili, R., Ganhisafar, Y.: SBAC: A Semantic-Based Access Control Model. In: NORDSEC 2006 (2006)"},{"key":"69_CR8","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese Wall Security Policy. In: IEEE Symposium on Security and Privacy, Oakland, California (1989)"},{"key":"69_CR9","unstructured":"Dias, P., Ribeiro, C., Ferreira, P.: Enforcing History-Based Security Policies in Mobile Agent Systems (2003)"},{"key":"69_CR10","doi-asserted-by":"crossref","unstructured":"Edjlali, G., Acharya, A., Chaudhary, V.: History-based access control for mobile code. In: 5th ACM conference on Computer and communications security (1998)","DOI":"10.1145\/288090.288102"},{"key":"69_CR11","unstructured":"Abadi, M., Fournet, C.: Access control based on execution history. In: 10th Annual Network and Distributed System Security Symposium (2003)"},{"key":"69_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/69.485637","volume":"8","author":"E. Bertino","year":"1996","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: A temporal access control mechanism for Database Systems. IEEE Trans. Knowl. Data Eng.\u00a08, 67\u201380 (1996)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"69_CR13","unstructured":"Thomas, R.K., Sandhu, R.S.: Sixteenth National Computer Security Conference. Baltimore, Md. (1993)"},{"key":"69_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Systems\u00a023, 231\u2013285 (1998)","journal-title":"ACM Trans. Database Systems"},{"key":"69_CR15","doi-asserted-by":"crossref","unstructured":"Ruan, C.: Decentralized Temporal Authorization Administration. CIT\/27\/2003 (2003)","DOI":"10.1007\/978-3-540-45227-0_89"},{"key":"69_CR16","doi-asserted-by":"publisher","first-page":"309","DOI":"10.3233\/JCS-2000-8404","volume":"8","author":"E. Bertino","year":"2000","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E., Sapino, M.L.: Temporal authorization bases: From specification to integration. Journal of Computer Security\u00a08, 309\u2013353 (2000)","journal-title":"Journal of Computer Security"}],"container-title":["Communications in Computer and Information Science","Advances in Computer Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89985-3_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:30:06Z","timestamp":1558387806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89985-3_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540899846","9783540899853"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89985-3_69","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2008]]}}}