{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:44:56Z","timestamp":1725551096796},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_41","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T22:11:05Z","timestamp":1270073465000},"page":"468-481","source":"Crossref","is-referenced-by-count":0,"title":["Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control"],"prefix":"10.1007","author":[{"given":"Daren","family":"Zha","sequence":"first","affiliation":[]},{"given":"Jiwu","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiaoqi","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/775412.775430","volume-title":"SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies","author":"M.A. Al-Kahtani","year":"2003","unstructured":"Al-Kahtani, M.A., Sandhu, R.: Induced role hierarchies with attribute-based rbac. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 142\u2013148. ACM, New York (2003)"},{"key":"41_CR2","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1145\/1377836.1377866","volume-title":"SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies","author":"L. Bauer","year":"2008","unstructured":"Bauer, L., Garriss, S., Reiter, M.K.: Detecting and resolving policy misconfigurations in access-control systems. In: SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 185\u2013194. ACM, New York (2008)"},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/319171.319174","volume-title":"RBAC 1999: Proceedings of the fourth ACM workshop on Role-based access control","author":"K. Beznosov","year":"1999","unstructured":"Beznosov, K., Deng, Y.: A framework for implementing role-based access control using corba security service. In: RBAC 1999: Proceedings of the fourth ACM workshop on Role-based access control, pp. 19\u201330. ACM, New York (1999)"},{"key":"41_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/373256.373258","volume-title":"SACMAT 2001: Proceedings of the sixth ACM symposium on Access control models and technologies","author":"M.J. Covington","year":"2001","unstructured":"Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: SACMAT 2001: Proceedings of the sixth ACM symposium on Access control models and technologies, pp. 10\u201320. ACM, New York (2001)"},{"key":"41_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1463434.1463530","volume-title":"GIS 2008: Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems","author":"I.F. Cruz","year":"2008","unstructured":"Cruz, I.F., Gjomemo, R., Lin, B., Orsini, M.: A location aware role and attribute based access control system. In: GIS 2008: Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems, pp. 1\u20132. ACM, New York (2008)"},{"issue":"3","key":"41_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"41_CR7","first-page":"89","volume-title":"CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security","author":"G. Vipul","year":"2006","unstructured":"Vipul, G., Omkant, P., Amit, S., Brent, W.: Attribute-based encryption for fine-grained access control of encrypted data. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security, pp. 89\u201398. ACM, New York (2006)"},{"key":"41_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1145\/67544.66945","volume-title":"SIGMOD 1989: Proceedings of the 1989 ACM SIGMOD international conference on Management of data","author":"Y.E. Ioannidis","year":"1989","unstructured":"Ioannidis, Y.E., Sellis, T.K.: Conflict resolution of rules assigning values to virtual attributes. In: SIGMOD 1989: Proceedings of the 1989 ACM SIGMOD international conference on Management of data, pp. 205\u2013214. ACM, New York (1989)"},{"key":"41_CR9","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1145\/237661.237710","volume-title":"PODS 1996: Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems","author":"H.V. Jagadish","year":"1996","unstructured":"Jagadish, H.V., Mendelzon, A.O., Mumick, I.S.: Managing conflicts between rules (extended abstract). In: PODS 1996: Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, pp. 192\u2013201. ACM, New York (1996)"},{"key":"41_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-45931-6_16","volume-title":"Foundations of Software Science and Computation Structures","author":"M. Koch","year":"2002","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: Conflict detection and resolution in access control policy specifications. In: Nielsen, M., Engberg, U. (eds.) FOSSACS 2002. LNCS, vol.\u00a02303, pp. 223\u2013237. Springer, Heidelberg (2002)"},{"key":"41_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1035429.1035437","volume-title":"FMSE 2003: Proceedings of the 2003 ACM workshop on Formal methods in security engineering","author":"M. Koch","year":"2003","unstructured":"Koch, M., Parisi-Presicce, F.: Formal access control analysis in the software development process. In: FMSE 2003: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, pp. 67\u201376. ACM, New York (2003)"},{"key":"41_CR12","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/1229285.1229305","volume-title":"ASIACCS 2007: Proceedings of the 2nd ACM symposium on Information, computer and communications security","author":"N. Li","year":"2007","unstructured":"Li, N., Mao, Z.: Administration in role-based access control. In: ASIACCS 2007: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 127\u2013138. ACM, New York (2007)"},{"key":"41_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-540-30115-8_26","volume-title":"Machine Learning: ECML 2004","author":"T. Lindgren","year":"2004","unstructured":"Lindgren, T.: Methods for rule conflict resolution. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS (LNAI), vol.\u00a03201, pp. 262\u2013273. Springer, Heidelberg (2004)"},{"key":"41_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1141277.1141284","volume-title":"SAC 2006: Proceedings of the 2006 ACM symposium on Applied computing","author":"T. Lindgren","year":"2006","unstructured":"Lindgren, T.: On handling conflicts between rules with numerical features. In: SAC 2006: Proceedings of the 2006 ACM symposium on Applied computing, pp. 37\u201341. ACM, New York (2006)"},{"issue":"1","key":"41_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/383775.383777","volume":"4","author":"J.S. Park","year":"2001","unstructured":"Park, J.S., Sandhu, R., Ahn, G.-J.: Role-based access control on the web. ACM Trans. Inf. Syst. Secur.\u00a04(1), 37\u201371 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"41_CR16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"41_CR17","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1145\/1315245.1315300","volume-title":"CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security","author":"S.D. Stoller","year":"2007","unstructured":"Stoller, S.D., Yang, P., Ramakrishnan, C.R., Gofman, M.I.: Efficient policy analysis for administrative role based access control. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 445\u2013455. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:04:39Z","timestamp":1619784279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}