{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:40:29Z","timestamp":1725550829153},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_106","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:11:44Z","timestamp":1270048304000},"page":"586-591","source":"Crossref","is-referenced-by-count":2,"title":["Team Automata Based Framework for Spatio-Temporal RBAC Model"],"prefix":"10.1007","author":[{"given":"N.","family":"Jaisankar","sequence":"first","affiliation":[]},{"given":"S.","family":"Veeramalai","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"106_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/978-3-540-40022-6_15","volume-title":"Petri Net Technology for Communication-Based Systems","author":"J. Kleijn","year":"2003","unstructured":"Kleijn, J.: Team Automata for CSCW \u2013 A Survey. In: Ehrig, H., Reisig, W., Rozenberg, G., Weber, H. (eds.) Petri Net Technology for Communication-Based Systems. LNCS, vol.\u00a02472, pp. 295\u2013320. Springer, Heidelberg (2003)"},{"key":"106_CR2","series-title":"Electronic Notes in Theoretical Computer Science","first-page":"105","volume-title":"Team automata for security -a survey","author":"M.H. Beek Ter","year":"2005","unstructured":"Ter Beek, M.H., Lenzini, G., Petrocchi, M.: Team automata for security -a survey. Electronic Notes in Theoretical Computer Science, vol.\u00a0128, pp. 105\u2013119. Elsevier, Amsterdam (2005)"},{"issue":"1","key":"106_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1023\/A:1022407907596","volume":"12","author":"M.H. Beek Ter","year":"2003","unstructured":"Ter Beek, M.H., Ellis, C.A., Kleijn, J., Rozenberg, G.: Synchronizations in team automata for groupware systems, Computer Supported Cooperative Work. The Journal of Collaborative Computing\u00a012(1), 21\u201369 (2003)","journal-title":"The Journal of Collaborative Computing"},{"key":"106_CR4","first-page":"415","volume-title":"Proc. GROUP 1997","author":"C.A. Ellis","year":"1997","unstructured":"Ellis, C.A.: Team Automata for Groupware Systems. In: Proc. GROUP 1997, pp. 415\u2013424. ACM Press, New York (1997)"},{"issue":"3","key":"106_CR5","first-page":"219","volume":"2","author":"N.A. Lynch","year":"1989","unstructured":"Lynch, N.A., Tuttle, M.R.: An Introduction to Input\/Output Automata. CWI Quarterly\u00a02(3), 219\u2013246 (1989); Tech. Memo MIT\/LCS\/TM-373 (1988)","journal-title":"CWI Quarterly"},{"key":"106_CR6","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/0-306-48019-0_4","volume-title":"Proc. ECSCW 2001","author":"M.H. Beek Ter","year":"2001","unstructured":"Ter Beek, M.H., Ellis, C.A., Kleijn, J., Rozenberg, G.: Team Automata for Spatial Access Control. In: Proc. ECSCW 2001, pp. 59\u201377. Kluwer, Dordrecht (2001)"},{"key":"106_CR7","unstructured":"Ter Beek, M.H., Lenzini, G., Petrocchi, M.: Team Automata for Security Analysis of Multicast\/Broadcast Communication. Technical Report 2003-TR-13, Istituto di Scienza e Tecnologie dell\u2019Informazione, Consiglio Nazionale delle Ricerche. Presented at WISP 2003 (2003)"},{"key":"106_CR8","unstructured":"Ter Beek, M.H., Lenzini, G., Petrocchi, M.: Team Automata for Security Analysis. Technical Report. TR-CTIT, pp. 04\u201313. Centre for Telematics and Information Technology, University"},{"key":"106_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1007\/3-540-48119-2_44","volume-title":"FM\u201999 - Formal Methods","author":"R. Focardi","year":"1999","unstructured":"Focardi, R., Martinelli, F.: A Uniform Approach for the Definition of Security Properties. In: Wing, J.M., Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 794\u2013813. Springer, Heidelberg (1999)"},{"issue":"1","key":"106_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable Security Policies. ACM Transactions on Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"106_CR11","first-page":"319","volume":"4","author":"S. Mondal","year":"2009","unstructured":"Mondal, S., Sural, S.: Security Analysis of RBAC with temporal and constraints-A Model Cheking Approach. Journal of Information Assurance Security\u00a04, 319\u2013328 (2009)","journal-title":"Journal of Information Assurance Security"},{"key":"106_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/978-3-540-30073-1_13","volume-title":"Secure Data Management","author":"H. Yu","year":"2004","unstructured":"Yu, H., Lim, E.-P.: LTAM: A Location-Temporal Authorization Model. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2004. LNCS, vol.\u00a03178, pp. 172\u2013186. Springer, Heidelberg (2004)"},{"key":"106_CR13","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security\u00a04(3) (August 2001)","DOI":"10.1145\/501978.501980"},{"key":"106_CR14","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Long, W., Srinivasan, S., Dey, A., Ashamed, M., Abode, G.: Securing Context-Aware Applications Using Environment Roles. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, USA, May 2001, pp. 10\u201320 (2001)","DOI":"10.1145\/373256.373258"},{"key":"106_CR15","doi-asserted-by":"crossref","unstructured":"Mondal, S., Sural, S., Atlari, V.: Towards Formal Security Analysis of GTRBAC using Timed Automata. In: SACMAT 2009, Italy, June 3-5, pp. 33\u201342 (2009)","DOI":"10.1145\/1542207.1542214"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_106.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:05:48Z","timestamp":1619769948000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_106","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}