{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:13Z","timestamp":1763467933635,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642030949"},{"type":"electronic","value":"9783642030956"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03095-6_65","type":"book-chapter","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T17:40:55Z","timestamp":1248975655000},"page":"693-703","source":"Crossref","is-referenced-by-count":18,"title":["A Semantic-Aware Attribute-Based Access Control Model for Web Services"],"prefix":"10.1007","author":[{"given":"Haibo","family":"Shen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","unstructured":"World Wide Web Consortium. Web service, http:\/\/www.w3.org\/2002\/ws"},{"key":"65_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BFb0023301","volume-title":"Information Security and Privacy","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S.: Access Control: The Neglected Frontier. In: Pieprzyk, J.P., Seberry, J. (eds.) ACISP 1996. LNCS, vol.\u00a01172, pp. 219\u2013227. Springer, Heidelberg (1996)"},{"issue":"3","key":"65_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.: Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security (TISSEC)\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"65_CR4","doi-asserted-by":"crossref","unstructured":"Damiani, E., de Capitani di Vimercati, S., Samarati, P.: New Paradigms for Access Control in Open Environments. In: Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology, pp. 540\u2013545 (2005)","DOI":"10.1109\/ISSPIT.2005.1577155"},{"key":"65_CR5","doi-asserted-by":"crossref","unstructured":"Mohammad, A., Al-Kahtani, S.R.: A Model of Attribute-Based User-Role Assignment. In: Proceedings of the 18th Annual Computer Security Application Conference, pp. 353\u2013362 (2002)","DOI":"10.1109\/CSAC.2002.1176307"},{"key":"65_CR6","doi-asserted-by":"crossref","unstructured":"Priebe, T., Fernandez, E.B., Mehlau, J.I., Pernul, G.: A Patterns System for Access Control. In: Proceedings of the 18th Annual IFIPWG 11.3 Working Conference on Data and Application Security, pp. 25\u201328 (2004)","DOI":"10.1007\/1-4020-8128-6_16"},{"key":"65_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T. Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hander, J., Lassila, O.: The Semantic Web. Scientific American\u00a0284, 34\u201343 (2001)","journal-title":"Scientific American"},{"key":"65_CR8","unstructured":"Godik, S., Moses, T.: eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard (2008), http:\/\/www.oasis-open.org\/committees\/download.php\/28318\/xacml-3.0-core-wd06.zip"},{"key":"65_CR9","unstructured":"Carmody, S.: Shibboleth Overview and Requirements. Shibboleth Working Group Document (2001), http:\/\/shibboleth.internet2.edu\/docs\/draft-internet2-shibboleth-requirements-01.html"},{"key":"65_CR10","unstructured":"OASIS Standard. Security Assertion Markup Language (SAML) V2.0 (2005), http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/"},{"key":"65_CR11","unstructured":"Welch, V., Barton, T., Keahey, K., Siebenlist, F.: Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration. In: Proceedings of the 4th Annual PKI R&D Workshop, pp. 19\u201321 (2005)"},{"key":"65_CR12","unstructured":"McGuinness, D.L., van Harmelen, F.: OWL Web Ontology Language Overview (2004), http:\/\/www.w3.org\/TR\/owl-features\/"},{"key":"65_CR13","unstructured":"Horrocks, I., Patel-Schneider, P.F., Boley, H.: SWRL: A Semantic Web Rule Language Combining OWL and ReleML (2004), http:\/\/www.w3.org\/Submission\/SWRL\/"},{"key":"65_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/11961635_11","volume-title":"Information Systems Security","author":"E. Damiani","year":"2006","unstructured":"Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending context descriptions in semantics-aware access control. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol.\u00a04332, pp. 162\u2013176. Springer, Heidelberg (2006)"},{"key":"65_CR15","unstructured":"Simple Object Access Protocol (SOAP) V1.1 (May 2000), http:\/\/www.w3.org\/TR\/2000\/NOTE-SOAP-20000508"},{"key":"65_CR16","unstructured":"Prot\u00e9g\u00e9 Editor and API, http:\/\/protege.stanford.edu\/plugins\/owl"},{"key":"65_CR17","unstructured":"Jess Rule Engine, http:\/\/herzberg.ca.sandia.gov\/jess"},{"key":"65_CR18","doi-asserted-by":"crossref","unstructured":"Damiani, E., di Vimercati, S.D.C., Paraboschi, S.: Fine Grained Access Control for SOAP e-services. In: Proceedings of the 10th International Conference on World Wide Web, pp. 504\u2013513 (2001)","DOI":"10.1145\/371920.372152"},{"key":"65_CR19","doi-asserted-by":"crossref","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A Trust-based Context-Aware Access Control Model for Web Services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2004), pp. 184\u2013191 (2004)","DOI":"10.1109\/ICWS.2004.1314738"},{"key":"65_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-540-30207-0_54","volume-title":"Grid and Cooperative Computing - GCC 2004 Workshops","author":"X. Feng","year":"2004","unstructured":"Feng, X., Jun, X., Hao, H., Li, X.: Context-Aware Role-Based Access Control Model for Web Services. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds.) GCC 2004. LNCS, vol.\u00a03252, pp. 430\u2013436. Springer, Heidelberg (2004)"},{"key":"65_CR21","doi-asserted-by":"crossref","unstructured":"Liu, M., Guo, H.Q., Su, J.D.: An Attribute and Role-Based Access Control Model for Web Services. In: Proceedings of the 4th International Conference on Machine Learning and Cybernetics, pp. 1302\u20131306 (2005)","DOI":"10.1109\/ICMLC.2005.1527144"},{"key":"65_CR22","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Gommans, L.C.: Extending Role Based Access Control Model for Distributed Multidomain Applications. In: Proceedings of the IFIP TC-11 22nd International Information Security Conference, pp. 301\u2013312 (2007)","DOI":"10.1007\/978-0-387-72367-9_26"},{"key":"65_CR23","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed Based Access Control (ABAC) for Web Services. In: Proceedings of the IEEE Conference on Web Services (ICWS 2005), pp. 561\u2013569 (2005)","DOI":"10.1109\/ICWS.2005.25"},{"key":"65_CR24","doi-asserted-by":"crossref","unstructured":"Shen, H.B., Hong, F.: An Attribute\u2013Based Access Control Model for Web Services. In: Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 74\u201379 (2006)","DOI":"10.1109\/PDCAT.2006.28"},{"key":"65_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-74409-2_14","volume-title":"Trust, Privacy and Security in Digital Business","author":"M. Coetzee","year":"2007","unstructured":"Coetzee, M., Eloff, J.H.P.: A Trust and Context Aware Access Control Model for Web Service Conversations. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus. LNCS, vol.\u00a04657, pp. 115\u2013124. Springer, Heidelberg (2007)"},{"key":"65_CR26","doi-asserted-by":"crossref","unstructured":"Damiani, E., de Capitani di Vimercati, S., Samarati, P.: New Paradigms for Access Control in Open Environments. In: Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology, pp. 540\u2013545 (2005)","DOI":"10.1109\/ISSPIT.2005.1577155"},{"key":"65_CR27","doi-asserted-by":"crossref","unstructured":"Priebe, T., Dobmeier, W., Kamprath, N.: Supporting Attribute-based Access Control with Ontologies. In: The First International Conference on Availability, Reliability and Security (ARES 2006), pp. 465\u2013472 (2006)","DOI":"10.1109\/ARES.2006.127"},{"key":"65_CR28","doi-asserted-by":"crossref","unstructured":"Warner, J., Atluri, V., Mukkamala, R., Vaidya, J.: Using semantics for automatic enforcement of access control policies among dynamic coalitions. In: Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 235\u2013244 (2007)","DOI":"10.1145\/1266840.1266877"},{"key":"65_CR29","doi-asserted-by":"crossref","unstructured":"Shields, B., Molloy, O., Lyons, G., Duggan, J.: Using Semantic Rules to Determine Access Control for Web Services. In: Proceedings of the 15th international conference on World Wide Web, pp. 913\u2013914 (2006)","DOI":"10.1145\/1135777.1135941"},{"key":"65_CR30","unstructured":"Coetzee, M., Eloff, J.H.P.: A Logic-based Access Control Approach for Web Services. In: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, Information Security South Africa, pp. 1\u201311 (2004)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03095-6_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T15:44:47Z","timestamp":1739288687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03095-6_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642030949","9783642030956"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03095-6_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}