{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:05:41Z","timestamp":1725563141173},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642151132"},{"type":"electronic","value":"9783642151149"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15114-9_44","type":"book-chapter","created":{"date-parts":[[2010,8,27]],"date-time":"2010-08-27T08:47:53Z","timestamp":1282898873000},"page":"476-479","source":"Crossref","is-referenced-by-count":0,"title":["Identity Management Mismatch Challenges in the Danish Municipality Administration System"],"prefix":"10.1007","author":[{"given":"Mads Schaarup","family":"Andersen","sequence":"first","affiliation":[]},{"given":"Henrik B\u00e6rbak","family":"Christensen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Bardram, J., Christensen, H., Hansen, K.: Architectural Prototyping: An Approach for Grounding Architectural Design and Learning. In: Proceedings of Fourth Working IEEE\/IFIP Conference on Software Architecture. WICSA 2004, June 2004, pp. 15\u201324 (2004)","DOI":"10.1109\/WICSA.2004.1310686"},{"issue":"3","key":"44_CR2","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur.\u00a04(3), 191\u2013233 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"44_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"6","key":"44_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/52.469757","volume":"12","author":"D. Garlan","year":"1995","unstructured":"Garlan, D., Allen, R., Ockerbloom, J.: Architectural Mismatch: Why Reuse is so Hard. IEEE Software\u00a012(6), 17\u201326 (1995)","journal-title":"IEEE Software"},{"issue":"4","key":"44_CR5","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MS.2009.86","volume":"26","author":"D. Garlan","year":"2009","unstructured":"Garlan, D., Allen, R., Ockerbloom, J.: Architectural Mismatch: Why Reuse Is Still So Hard. IEEE Software\u00a026(4), 66\u201369 (2009)","journal-title":"IEEE Software"},{"key":"44_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J.B. Joshi","year":"2005","unstructured":"Joshi, J.B., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering\u00a017, 4\u201323 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"44_CR7","unstructured":"KMD, http:\/\/www.kmd.dk\/"},{"key":"44_CR8","unstructured":"Linkies, M., Off, F.: SAP Security and Authorizations. SAP Press (2006)"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control. In: International Conference on Distributed Computing Systems, p. 391 (2001)","DOI":"10.1109\/ICDSC.2001.918969"},{"issue":"2","key":"44_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"44_CR11","unstructured":"SAP, http:\/\/www.sap.com\/"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Sj\u00f8berg, D., Dyba, T., J\u00f8rgensen, M.: The Future of Empirical Methods in Software Engineering Research. In: Future of Software Engineering, FOSE 2007, May 2007, pp. 358\u2013378 (2007)","DOI":"10.1109\/FOSE.2007.30"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15114-9_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T09:52:22Z","timestamp":1559469142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15114-9_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642151132","9783642151149"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15114-9_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}