{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:29Z","timestamp":1725562589964},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_5","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"55-69","source":"Crossref","is-referenced-by-count":4,"title":["Group-Centric Models for Secure and Agile Information Sharing"],"prefix":"10.1007","author":[{"given":"Ravi","family":"Sandhu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianwei","family":"Niu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"William H.","family":"Winsborough","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"9","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. Saltzer","year":"1975","unstructured":"Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of IEEE\u00a063(9), 1278\u20131308 (1975)","journal-title":"Proceedings of IEEE"},{"key":"5_CR2","unstructured":"Wikipedia: Analog hole (September 2009) (Online; accessed December 15, 2009)"},{"key":"5_CR3","unstructured":"TCG: TCG specification architecture overview (August 2007), http:\/\/www.trustedcomputinggroup.org"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: A conceptual framework for group-centric secure information sharing. ACM Symposium on Information, Computer and Comm. Security (March 2009)","DOI":"10.1145\/1533057.1533111"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.H.: Foundations for group-centric secure information sharing models. In: Proc. of ACM Symposium on Access Control Models and Technologies (2009)","DOI":"10.1145\/1542207.1542227"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: Towards a framework for group-centric secure collaboration. In: Proceedings of IEEE International Conference on Collaborative Computing (2009)","DOI":"10.4108\/ICST.COLLABORATECOM2009.8305"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/1266840.1266863","volume-title":"ACM Symposium on Access Control Models and Technologies (SACMAT 2007)","author":"R. Krishnan","year":"2007","unstructured":"Krishnan, R., Sandhu, R., Ranganathan, K.: PEI models towards scalable, usable and high-assurance information sharing. In: ACM Symposium on Access Control Models and Technologies (SACMAT 2007), pp. 145\u2013150. ACM, New York (2007)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: The PEI framework for application-centric security. In: Proceedings of 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (2009)","DOI":"10.4108\/ICST.COLLABORATECOM2009.8382"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ranganathan, K., Zhang, X.: Secure information sharing enabled by trusted computing and PEI models. In: Proc. of ACM Symp. on Inf. Computer and Comm. Security, pp. 2\u201312 (2006)","DOI":"10.1145\/1128817.1128820"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Samarati, P.: Access control: Principles and practice\u00a032(9), 40\u201348 (1994)","DOI":"10.1109\/35.312842"},{"key":"5_CR11","unstructured":"OrangeBook: Trusted Computer System Evaluation Criteria. DoD National Computer Security Center (December 1985)"},{"key":"5_CR12","unstructured":"Graham, G., Denning, P.: Protection-principles and practice. In: Proceedings of the AFIPS Spring Joint Computer Conference, vol.\u00a040, pp. 417\u2013429 (1972)"},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B. Lampson","year":"1974","unstructured":"Lampson, B.: Protection. ACM SIGOPS Operating Systems Review\u00a08(1), 18\u201324 (1974)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"5_CR14","unstructured":"Graubart, R.: On the Need for a Third Form of Access Control. In: Proceedings of the 12th National Computer Security Conference, pp. 296\u2013304 (1989)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"McCollum, C., Messing, J., Notargiacomo, L.: Beyond the pale of MAC and DAC - defining new forms of access control. In: Proceedings of the 1990 IEEE Symposium on Security and Privacy, pp. 190\u2013200 (1990)","DOI":"10.1109\/RISP.1990.63850"},{"key":"5_CR16","unstructured":"Abrams, M., Heaney, J., King, O., LaPadula, L., Lazear, M., Olson, I.: Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy. In: Nat. Comp. Sec. Conf. (1991)"},{"key":"5_CR17","unstructured":"Park, J., Sandhu, R.: Originator control in usage control. In: Policies for Distrib. Syst. and Networks (2002)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Bell, D., La Padula, L.: Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306 (1975)","DOI":"10.21236\/ADA023588"},{"issue":"5","key":"5_CR19","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. Denning","year":"1976","unstructured":"Denning, D.: A Lattice Model of Secure Information Flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"issue":"11","key":"5_CR20","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R. Sandhu","year":"1993","unstructured":"Sandhu, R.: Lattice-Based Access Control Models. IEEE Computer\u00a026(11), 9\u201319 (1993)","journal-title":"IEEE Computer"},{"issue":"3","key":"5_CR21","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. on Inf. and Syst. Security (TISSEC)\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. on Inf. and Syst. Security (TISSEC)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer, 38\u201347 (1996)","DOI":"10.1109\/2.485845"},{"issue":"2","key":"5_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S. Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. on Inf. and Syst. Security\u00a03(2), 85\u2013106 (2000)","journal-title":"ACM Trans. on Inf. and Syst. Security"},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Transactions on Information and System Security (TISSEC)\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"5_CR25","unstructured":"XACML: OASIS eXtensible Access Control Markup Language (April 2009), http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Levin, R., Cohen, E., Corwin, W., Pollack, F., Wulf, W.: Policy\/mechanism separation in Hydra. In: 5th ACM Symposium on Operating Systems Principles, pp. 132\u2013140 (1975)","DOI":"10.1145\/800213.806531"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys, 309\u2013329 (September 2003)","DOI":"10.1145\/937503.937506"},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/SECPRI.1995.398923","volume-title":"SP 1995: Proceedings of the 1995 IEEE Symposium on Security and Privacy","author":"L. Badger","year":"1995","unstructured":"Badger, L., Sterne, D.F., Sherman, D.L., Walker, K.M., Haghighat, S.A.: Practical domain and type enforcement for unix. In: SP 1995: Proceedings of the 1995 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 66. IEEE Computer Society, Los Alamitos (1995)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Foley, S.N.: A model for secure information flow. IEEE Symposium on Security and Privacy, 248\u2013258 (1989)","DOI":"10.1109\/SECPRI.1989.36299"},{"key":"5_CR30","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/507711.507726","volume-title":"SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies","author":"C.E. Phillips Jr.","year":"2002","unstructured":"Phillips Jr., C.E., Ting, T., Demurjian, S.A.: Information sharing and security in dynamic coalitions. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 87\u201396. ACM, New York (2002)"},{"issue":"2","key":"5_CR31","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/501963.501964","volume":"4","author":"D. Shands","year":"2001","unstructured":"Shands, D., Jacobs, J., Yee, R., Sebes, E.: Secure virtual enclaves: Supporting coalition use of distributed application technologies. ACM Transactions on Information and System Security (TISSEC)\u00a04(2), 103\u2013133 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/ICDCS.2002.1022279","volume-title":"ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS2002)","author":"E. Freudenthal","year":"2002","unstructured":"Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V.: drbac: Distributed role-based access control for dynamic coalition environments. In: ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS2002), Washington, DC, USA, pp. 411\u2013420. IEEE Computer Society, Los Alamitos (2002)"},{"key":"5_CR33","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/507711.507727","volume-title":"SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies","author":"E. Cohen","year":"2002","unstructured":"Cohen, E., Thomas, R.K., Winsborough, W., Shands, D.: Models for coalition-based access control (CBAC). In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 97\u2013106. ACM, New York (2002)"},{"key":"5_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1456396.1456402","volume-title":"Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering","author":"R. Krishnan","year":"2008","unstructured":"Krishnan, R., Niu, J., Sandhu, R., Winsborough, W.: Stale-safe security properties for group-based secure information sharing. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, pp. 53\u201362. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:36Z","timestamp":1606186596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}