{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:44Z","timestamp":1725536024152},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033537"},{"type":"electronic","value":"9783642033544"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03354-4_24","type":"book-chapter","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T06:46:56Z","timestamp":1248331616000},"page":"322-339","source":"Crossref","is-referenced-by-count":7,"title":["A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments"],"prefix":"10.1007","author":[{"given":"Isabel F.","family":"Cruz","sequence":"first","affiliation":[]},{"given":"Rigel","family":"Gjomemo","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Mirko","family":"Orsini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","first-page":"353","volume-title":"Annual Computer Security Applications Conference (ACSAC)","author":"M.A. Al-Kahtani","year":"2002","unstructured":"Al-Kahtani, M.A., Sandhu, R.: A Model for Attribute-Based User- Role Assignment. In: Annual Computer Security Applications Conference (ACSAC), pp. 353\u2013364. IEEE Computer Society, Los Alamitos (2002)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.A., Sandhu, R.: Induced role hierarchies with attributebased RBAC. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 142\u2013148 (2003)","DOI":"10.1145\/775427.775430"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: A Spatially Aware RBAC. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 29\u201337 (2005)","DOI":"10.1145\/1063979.1063985"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1007\/978-3-540-76890-6_53","volume-title":"On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops","author":"L. Cirio","year":"2007","unstructured":"Cirio, L., Cruz, I.F., Tamassia, R.: A Role and Attribute Based Access Control System Using Semantic Web Technologies. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM-WS 2007, Part II. LNCS, vol.\u00a04806, pp. 1256\u20131266. Springer, Heidelberg (2007)"},{"key":"24_CR5","unstructured":"Clark & Parsia, LLC. Pellet, http:\/\/pellet.owldl.com"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-540-73538-0_7","volume-title":"Data and Applications Security XXI","author":"I.F. Cruz","year":"2007","unstructured":"Cruz, I.F., Tamassia, R., Yao, D.: Privacy-Preserving Schema Matching Using Mutual Information. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 93\u201394. Springer, Heidelberg (2007)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Bertino, E.: Access Control and Privacy in Location- Aware Services for Mobile Organizations. In: International Conference on Mobile Data Management (MDM), pp. 11\u201320 (2006)","DOI":"10.1109\/MDM.2006.26"},{"issue":"1","key":"24_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1210263.1210265","volume":"10","author":"M.L. Damiani","year":"2007","unstructured":"Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: A Spatially Aware RBAC. ACM Transactions on Information and System Security (TISSEC)\u00a010(1), 2 (2007)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"24_CR9","first-page":"10016","volume-title":"Theory of Lattice-Ordered Groups","author":"M.R. Darnel","year":"1995","unstructured":"Darnel, M.R.: Theory of Lattice-Ordered Groups, p. 10016. CRC Press, New York (1995)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Finin, T.W., Joshi, A., Kagal, L., Niu, J., Sandhu, R.S., Winsborough, W.H., Thuraisingham, B.M.: ROWLBAC: Representing Role Based Access Control in OWL. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 73\u201382 (2008)","DOI":"10.1145\/1377836.1377849"},{"key":"24_CR11","unstructured":"Horrocks, I., Patel-Schneider, P.F., Motik, B.: OWL 1.1 Web Ontology Language Structural Specification and Functional-Style Syntax (2007)"},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J. Joshi","year":"2005","unstructured":"Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering\u00a017(1), 4\u201323 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Kulkarni, D., Tripathi, A.: Context-aware Role-based Access Control in Pervasive Computing Systems. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 113\u2013122 (2008)","DOI":"10.1145\/1377836.1377854"},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S.L. Osborn","year":"2000","unstructured":"Osborn, S.L., Sandhu, R.S., Munawer, Q.: Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security (TISSEC)\u00a03(2), 85\u2013106 (2000)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"2","key":"24_CR15","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy Preserving Schema and Data Matching. In: ACM SIGMOD International Conference on Management of Data, pp. 653\u2013664 (2007)","DOI":"10.1145\/1247480.1247553"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: Proteus: A Semantic Context-Aware Adaptive Policy Model. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 129\u2013140 (2007)","DOI":"10.1109\/POLICY.2007.40"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03354-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T16:51:47Z","timestamp":1558457507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03354-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033537","9783642033544"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03354-4_24","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}