{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:59:21Z","timestamp":1725544761493},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117466"},{"type":"electronic","value":"9783642117473"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_12","type":"book-chapter","created":{"date-parts":[[2010,1,24]],"date-time":"2010-01-24T20:03:02Z","timestamp":1264363382000},"page":"157-165","source":"Crossref","is-referenced-by-count":2,"title":["Idea: Efficient Evaluation of Access Control Constraints"],"prefix":"10.1007","author":[{"given":"Achim D.","family":"Brucker","sequence":"first","affiliation":[]},{"given":"Helmut","family":"Petritsch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1180367.1180378","volume-title":"ACM workshop on Secure Web services (SWS)","author":"A.H. Anderson","year":"2006","unstructured":"Anderson, A.H.: A comparison of two privacy policy languages: epal and xacml. In: ACM workshop on Secure Web services (SWS), pp. 53\u201360. ACM Press, New York (2006)"},{"key":"12_CR2","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (epal 1.2). Tech. rep., ibm (2003), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal"},{"key":"12_CR3","unstructured":"Basel Committee on Banking Supervision: Basel II: International convergence of capital measurement and capital standards. Tech. rep., Bank for International Settlements, Basel, Switzerland (2004), http:\/\/www.bis.org\/publ\/bcbsca.htm"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D.A. Basin","year":"2006","unstructured":"Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From uml models to access control infrastructures. acm Transactions on Software Engineering and Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"acm Transactions on Software Engineering and Methodology"},{"key":"12_CR5","unstructured":"Brucker, A.D., Doser, J., Wolff, B.: An mda framework supporting ocl. Electronic Communications of the easst\u00a05 (2006)"},{"issue":"11","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1002\/cpe.1313","volume":"20","author":"D. Chadwick","year":"2008","unstructured":"Chadwick, D., Zhao, G., Otenko, S., Laborde, R., Su, L., Nguyen, T.A.: permis: a modular authorization infrastructure. Concurrency and Computation: Practice & Experience\u00a020(11), 1341\u20131357 (2008)","journal-title":"Concurrency and Computation: Practice & Experience"},{"key":"12_CR7","first-page":"130","volume-title":"acm symposium on access control models and technologies (sacmat)","author":"H. Chen","year":"2006","unstructured":"Chen, H., Li, N.: Constraint generation for separation of duty. In: acm symposium on access control models and technologies (sacmat), pp. 130\u2013138. ACM Press, New York (2006)"},{"key":"12_CR8","first-page":"111","volume-title":"acm symposium on access control models and technologies (sacmat)","author":"J. Crampton","year":"2006","unstructured":"Crampton, J., Leung, W., Beznosov, K.: The secondary and approximate authorization model and its application to Bell-LaPadula policies. In: acm symposium on access control models and technologies (sacmat), pp. 111\u2013120. ACM Press, New York (2006)"},{"issue":"7","key":"12_CR9","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.cose.2006.05.004","volume":"25","author":"V. Kapsalis","year":"2006","unstructured":"Kapsalis, V., Hadellis, L., Karelis, D., Koubias, S.: A dynamic context-aware access control architecture for e-services. Computers & Security\u00a025(7), 507\u2013521 (2006)","journal-title":"Computers & Security"},{"issue":"2","key":"12_CR10","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1145\/762476.762479","volume":"6","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G.: Access control with ibm Tivoli access manager. acm Transactions on Information and System Security\u00a06(2), 232\u2013257 (2003)","journal-title":"acm Transactions on Information and System Security"},{"key":"12_CR11","first-page":"207","volume-title":"Conference on Computational Science and Engineering (cse)","author":"M. Kohler","year":"2009","unstructured":"Kohler, M., Brucker, A.D., Schaad, A.: ProActive Caching: Generating caching heuristics for business process environments. In: Conference on Computational Science and Engineering (cse), vol.\u00a03, pp. 207\u2013304. IEEE Computer Society, Los Alamitos (2009)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Kohler, M., Schaad, A.: Pro active access control for business process-driven environments. In: Annual Computer Security Applications Conference (acsac) (2008)","DOI":"10.1109\/ACSAC.2008.26"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Liu, A.X., Chen, F., Hwang, J., Xie, T.: XEngine: A fast and scalable xacml policy evaluation engine. In: Conference on Measurement and Modeling of Computer Systems, Sigmetrics (2008)","DOI":"10.1145\/1375457.1375488"},{"key":"12_CR14","first-page":"1","volume-title":"Software engineering for secure systems (sess)","author":"P.L. Miseldine","year":"2008","unstructured":"Miseldine, P.L.: Automated xacml policy reconfiguration for evaluation optimisation. In: Software engineering for secure systems (sess), pp. 1\u20138. ACM Press, New York (2008)"},{"key":"12_CR15","unstructured":"OASIS: eXtensible Access Control Markup Language (xacml) 2.0 (2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/XACML-2.0-OS-NORMATIVE.zip"},{"key":"12_CR16","unstructured":"Sarbanes, P., Oxley, G., et al.: Sarbanes-Oxley Act of 2002. 107th Congress Report, House of Representatives, pp. 107\u2013610 (2002)"},{"key":"12_CR17","first-page":"1328","volume-title":"acm symposium on applied computing (SAC)","author":"A. Schaad","year":"2005","unstructured":"Schaad, A., Spadone, P., Weichsel, H.: A case study of separation of duty properties in the context of the Austrian \u201ceLaw\u201d process. In: acm symposium on applied computing (SAC), pp. 1328\u20131332. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:43:28Z","timestamp":1606167808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}