{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:00:15Z","timestamp":1725537615883},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044915"},{"type":"electronic","value":"9783642044922"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04492-2_38","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T04:01:51Z","timestamp":1252987311000},"page":"375-384","source":"Crossref","is-referenced-by-count":0,"title":["Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems"],"prefix":"10.1007","author":[{"given":"Seon-Ho","family":"Park","sequence":"first","affiliation":[]},{"given":"Young-Ju","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jung-Ho","family":"Eom","sequence":"additional","affiliation":[]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Ardissono, L., et al.: Adaptive medical workflow management for a context-dependent home healthcare asistance service. In: First International Workshop on Context for Web Services 2005, pp. 59\u201368 (2006)","key":"38_CR1","DOI":"10.1016\/j.entcs.2005.11.007"},{"unstructured":"Westkaemper, E., et al.: Smart factory - bridging the gap between digital planning and reality. In: 38th CIRP International Seminar on Manufacturing Systems (2005)","key":"38_CR2"},{"doi-asserted-by":"crossref","unstructured":"Lucke, D., et al.: Smart factory - a step towards the next genereation of manufacturing. In: 41st CIRP Conference on Manufacturing Systems, pp. 115\u2013118 (2008)","key":"38_CR3","DOI":"10.1007\/978-1-84800-267-8_23"},{"unstructured":"Wieland, M., et al.: Towards context-aware workflows. In: Proc. of UMICS 2007 (2007)","key":"38_CR4"},{"doi-asserted-by":"crossref","unstructured":"Wieland, M., et al.: Context Integration for Smart Workflows. In: Proc. of 6th PERCOM, pp. 239\u2013242 (2008)","key":"38_CR5","DOI":"10.1109\/PERCOM.2008.27"},{"issue":"3","key":"38_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., et al.: TRBAC: A temporal role-based access control model. ACM TISSEC\u00a04(3), 191\u2013233 (2001)","journal-title":"ACM TISSEC"},{"doi-asserted-by":"crossref","unstructured":"Covington, M.J., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proc. of 18th ACSAC, pp. 249\u2013258 (2002)","key":"38_CR7","DOI":"10.1109\/CSAC.2002.1176296"},{"doi-asserted-by":"crossref","unstructured":"Bertino, E., et al.: GEO-RBAC: A Spatially Aware RBAC. In: Proc. of 10th ACM SACMAT, pp. 29\u201337 (2005)","key":"38_CR8","DOI":"10.1145\/1063979.1063985"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-540-73538-0_16","volume-title":"Data and Applications Security XXI","author":"I. Ray","year":"2007","unstructured":"Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 211\u2013226. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Chen, L., Crampton, J.: On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control. In: Proc. of ASIACCS 2008, pp. 156\u2013167 (2008)","key":"38_CR10","DOI":"10.1145\/1368310.1368341"},{"key":"38_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/11847366_59","volume-title":"High Performance Computing and Communications","author":"S.-H. Park","year":"2006","unstructured":"Park, S.-H., et al.: Context-Role Based Access control for Context-Aware Application. In: Gerndt, M., Kranzlm\u00fcller, D. (eds.) HPCC 2006. LNCS, vol.\u00a04208, pp. 572\u2013580. Springer, Heidelberg (2006)"},{"key":"38_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-61770-1_27","volume-title":"Computer Security - ESORICS 96","author":"V. Atluri","year":"1996","unstructured":"Atluri, V., Huang, W.-K.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 44\u201364. Springer, Heidelberg (1996)"},{"key":"38_CR13","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1023\/A:1012972608697","volume":"18","author":"S. Wu","year":"2002","unstructured":"Wu, S., et al.: Authorization and Access Control of Application Data in Workflow Systems. Journal of Intelligent Information Systems\u00a018, 71\u201394 (2002)","journal-title":"Journal of Intelligent Information Systems"},{"doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: The IFIP WG11.3 Workshop on Database Security, pp. 166\u2013181 (1997)","key":"38_CR14","DOI":"10.1007\/978-0-387-35285-5_10"},{"issue":"3","key":"38_CR15","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., et al.: Proposed NIST Standard for Role-Based Access Control. ACM TISSEC\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM TISSEC"}],"container-title":["Lecture Notes in Computer Science","Management Enabling the Future Internet for Changing Business and New Computing Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04492-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T15:42:49Z","timestamp":1558539769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04492-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044915","9783642044922"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04492-2_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}