{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:45:08Z","timestamp":1725551108848},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_26","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T22:11:05Z","timestamp":1270073465000},"page":"296-308","source":"Crossref","is-referenced-by-count":2,"title":["The Research for Spatial Role-Based Access Control Model"],"prefix":"10.1007","author":[{"given":"Zhiwen","family":"Zou","sequence":"first","affiliation":[]},{"given":"Changqian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shiguang","family":"Ju","sequence":"additional","affiliation":[]},{"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Conye, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE computer"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Osborn, S.L., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans Information and System Security\u00a03(2) (February 2000)","DOI":"10.1145\/354876.354878"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Richard Kuhn, D.: Role based access control on MLS systems without kernel changes. In: Proc. of the third ACM Workshop on Role-Based Access Control , Fairfax, Virginia, United States, October 22-23, pp. 25\u201332 (1998)","DOI":"10.1145\/286884.286890"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Osborn, S.: Mandatory access control and role-based access control revisited. In: Proc of the Second ACM Workshop on Role-Based Access Control, Fairfa, Virginia, United States, November 06-07, pp. 31\u201340 (1997)","DOI":"10.1145\/266741.266751"},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"26_CR6","volume-title":"Spatial Role-Based Access Control Model for Wireless Networks","author":"F. Hansen","year":"2003","unstructured":"Hansen, F., Oleshchuk, V.: Spatial Role-Based Access Control Model for Wireless Networks. IEEE, Los Alamitos (2003)"},{"key":"26_CR7","unstructured":"Hansen, F., Oleshchuk, V.: SRBAC: a spatial role-based access control model for mobile systems. In: Proceedings of the 7th Nordic Workshop on Secure IT Systems, Norway (2003)"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/SECURECOMM.2005.50","volume-title":"Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks","author":"I. Ray","year":"2005","unstructured":"Ray, I., Yu, L.: Short paper: towards a location-aware role-based access control model. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 234\u2013236. IEEE Computer Society, Athens (2005)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11961635_10","volume-title":"Information Systems Security","author":"I. Ray","year":"2006","unstructured":"Ray, I., Kumar, M., Yu, L.: LRBAC: A location-aware role-based access control model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol.\u00a04332, pp. 147\u2013161. Springer, Kolkata (2006)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: a spatially aware RBAC. In: SACMAT 2005, pp. 29\u201337 (2005)","DOI":"10.1145\/1063979.1063985"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s11432-007-0033-6","volume":"50","author":"Z. Hong","year":"2007","unstructured":"Hong, Z., Yeping, H., Zhiguo, S.: A formal model for access control with supporting spatial context. Science in China Series F: Information Sciences\u00a050, 419\u2013439 (2007) (In Chinese)","journal-title":"Science in China Series F: Information Sciences"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/ICIMP.2007.17","volume-title":"Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007)","author":"X. Cui","year":"2007","unstructured":"Cui, X., Chen, Y., Gu, J.: Ex-RBAC: An extended role based access control model for location-aware mobile collaboration system. In: Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), pp. 36\u201341. IEEE Computer Society, Silicon Valley (2007)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Role activation hierarchies. In: Proceddings of 2rd Acm Workshop on Role-based Access Control, Fairfax, Virginia, October 22-23, pp. 65\u201379 (1998)","DOI":"10.1145\/286884.286891"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:04:35Z","timestamp":1619784275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}