{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:17:08Z","timestamp":1771705028488,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642026164","type":"print"},{"value":"9783642026171","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_8","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T14:22:04Z","timestamp":1245248524000},"page":"70-79","source":"Crossref","is-referenced-by-count":4,"title":["Selective Regression Test for Access Control System Employing RBAC"],"prefix":"10.1007","author":[{"given":"Chao","family":"Huang","sequence":"first","affiliation":[]},{"given":"Jianling","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuanjie","family":"Si","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Chandramouli, R., Ahn, G., Gavrila, S.I.: The role control center: features and case studies. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies SACMAT 2003 (2003)","DOI":"10.1145\/775412.775415"},{"key":"8_CR2","first-page":"38","volume":"48","author":"R. Sandhu","year":"1998","unstructured":"Sandhu, R.: Role Based Access Control. Adv. in Computer Science\u00a048, 38\u201347 (1998)","journal-title":"Adv. in Computer Science"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/373256.373257","volume-title":"Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. SACMAT 2001","author":"A. Schaad","year":"2001","unstructured":"Schaad, A., Moffett, J., Jacob, J.: The role-based access control system of a European bank: a case study and discussion. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. SACMAT 2001, Chantilly, Virginia, United States, pp. 3\u20139. ACM, New York (2001)"},{"issue":"4","key":"8_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MSECP.2003.1219078","volume":"1","author":"H.H. Thompson","year":"2003","unstructured":"Thompson, H.H.: Why Security Testing Is Hard. IEEE Security and Privacy\u00a01(4), 83\u201386 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Martin, E.: Testing and Analysis of Access Control Policies. In: Companion To the Proceedings of the 29th international Conference on Software Engineering, May 20 - 26 (2007)","DOI":"10.1109\/ICSECOMPANION.2007.73"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Ball, T.: On the limit of control flow analysis for regression test selection. In: ACM Int\u2019l Symp. on Softw. Testing and Analysis, pp. 134\u2013142 (March 1998)","DOI":"10.1145\/271771.271802"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/504282.504305","volume-title":"Proceedings of the 16th ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 2001","author":"M.J. Harrold","year":"2001","unstructured":"Harrold, M.J., Jones, J.A., Li, T.A.: Regression test selection for Java software. In: Proceedings of the 16th ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 2001, Tampa Bay, FL, USA, October 14 - 18, 2001, pp. 312\u2013326. ACM, New York (2001)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Vokolos, F., Pythia, P.F.: A regression test selection tool based on text differencing. In: International Conference on Reliability, Quality, and Safety of Software Intensive Systems (May 1997)","DOI":"10.1007\/978-0-387-35097-4_1"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Mouelhi, T., Traon, Y.L.: Model-Based Tests for Access Control Policies. In: Proceedings of the 2008 international Conference on Software Testing, Verification, and Validation, pp. 338\u2013347 (November 2008)","DOI":"10.1109\/ICST.2008.44"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Zheng, J., Robinson, B., Williams, L., Smiley, K.: Applying regression test selection for COTS-based applications. In: Proceedings of the 28th international Conference on Software Engineering, ICSE 2006, Shanghai, China, May 20-28 (2006)","DOI":"10.1145\/1134285.1134357"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T13:57:48Z","timestamp":1633615068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}