{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:25:34Z","timestamp":1725535534699},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642030789"},{"type":"electronic","value":"9783642030796"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03079-6_11","type":"book-chapter","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T11:40:53Z","timestamp":1248349253000},"page":"141-154","source":"Crossref","is-referenced-by-count":9,"title":["Access Policy Design Supported by FCA Methods"],"prefix":"10.1007","author":[{"given":"Frithjof","family":"Dau","sequence":"first","affiliation":[]},{"given":"Martin","family":"Knechtel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Lampson, B.: Protection. In: Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, pp. 437\u2013443 (1971)"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/344287.344301","volume-title":"RBAC 2000: Proceedings of the fifth ACM workshop on Role-based access control","author":"R. Sandhu","year":"2000","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: towards a unified standard. In: RBAC 2000: Proceedings of the fifth ACM workshop on Role-based access control, pp. 47\u201363. ACM Press, New York (2000)"},{"issue":"4","key":"11_CR3","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/506084.506085","volume":"35","author":"G. Saunders","year":"2001","unstructured":"Saunders, G., Hitchens, M., Varadharajan, V.: Role-based access control and the access control matrix. SIGOPS Oper. Syst. Rev.\u00a035(4), 6\u201320 (2001)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"11_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511711787","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"F. Baader","year":"2007","unstructured":"Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation and Applications, 2nd edn. Cambridge University Press, Cambridge (2007)","edition":"2"},{"key":"11_CR5","unstructured":"Knechtel, M., Hladik, J.: RBAC authorization decision with DL reasoning. In: ICWI 2008: Proceedings of the IADIS Int. Conf. WWW\/Internet (2008)"},{"key":"11_CR6","unstructured":"Knechtel, M., Hladik, J., Dau, F.: Using OWL DL reasoning to decide about authorization in RBAC. In: OWLED 2008: Proceedings of the OWLED 2008 Workshop on OWL: Experiences and Directions (2008)"},{"key":"11_CR7","volume-title":"Proceedings of the Twentieth Int. Joint Conf. on Artificial Intelligence (IJCAI 2007)","author":"F. Baader","year":"2007","unstructured":"Baader, F., Ganter, B., Sattler, U., Sertkaya, B.: Completing description logic knowledge bases using formal concept analysis. In: Proceedings of the Twentieth Int. Joint Conf. on Artificial Intelligence (IJCAI 2007). AAAI Press, Menlo Park (2007)"},{"key":"11_CR8","unstructured":"Lutz, C., Sattler, U.: Mary likes all cats. In: Baader, F., Sattler, U. (eds.) Proceedings of the 2000 Int. Workshop in Description Logics (DL 2000), Aachen, Germany, August 2000. CEUR-WS, vol.\u00a033, pp. 213\u2013226. RWTH Aachen (2000), \n                    \n                      http:\/\/SunSITE.Informatik.RWTH-Aachen.DE\/Publications\/CEUR-WS\/Vol-33\/"},{"key":"11_CR9","unstructured":"Rudolph, S., Kr\u00f6tzsch, M., Hitzler, P.: All elephants are bigger than all mice. In: Proceedings of the 21st International Workshop on Description Logics (DL 2008) (2008)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-27769-9_12","volume-title":"Conceptual Structures at Work","author":"B. Ganter","year":"2004","unstructured":"Ganter, B., Obiedkov, S.A.: Implications in triadic formal contexts. In: Wolff, K.E., Pfeiffer, H.D., Delugach, H.S. (eds.) ICCS 2004. LNCS, vol.\u00a03127, pp. 186\u2013195. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Structures: Leveraging Semantic Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03079-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T02:50:00Z","timestamp":1539312600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03079-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642030789","9783642030796"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03079-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}