{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:15:15Z","timestamp":1725567315808},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642159602"},{"type":"electronic","value":"9783642159619"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15961-9_84","type":"book-chapter","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T05:39:23Z","timestamp":1285911563000},"page":"713-721","source":"Crossref","is-referenced-by-count":1,"title":["Security, Privacy and Interoperability in Heterogeneous Systems"],"prefix":"10.1007","author":[{"given":"Jian","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Peter","family":"Bertok","sequence":"additional","affiliation":[]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"84_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, L., Brodsky, A., Swarup, V., Jajodia, S.: A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 181\u2013188 (2008)","DOI":"10.1109\/POLICY.2008.20"},{"key":"84_CR2","unstructured":"Hitachi ID Systems, Inc.: Beyond Roles: A Practical Approach to Enterprise User Provisioning, http:\/\/www.idsynch.com\/docs\/beyond-roles.html (access in August 2009)"},{"key":"84_CR3","unstructured":"He, Q., Anton, A.I.: A Framework for Modelling Privacy Requirements in Role Engineering. Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8207, USA"},{"key":"84_CR4","unstructured":"Li, X., Naeem, N.A., Kemme, B.: Fine-Granularity Access Control in 3-tier Laboratory Information Systems. In: The Proceedings of the 9th International Database Engineering & Application Symposium, IDEAS 2005 (2005)"},{"key":"84_CR5","doi-asserted-by":"crossref","unstructured":"Abdallah, A.E., Khayat, E.J.: A Formal Model for Parameterized Role-based Access Control. Research Institute for Computing, London South Bank University, U.K. (2005)","DOI":"10.1007\/0-387-24098-5_17"},{"key":"84_CR6","doi-asserted-by":"crossref","unstructured":"Acevedo, M.T., Fillingham, D., Nicolettos, J.L.: Enterprise Security Application of Partition Rule Based Access Control (PRBAC). In: Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, pp. 285\u2013292","DOI":"10.1109\/ENABL.1997.630827"},{"key":"84_CR7","doi-asserted-by":"crossref","unstructured":"Martino, L.D., Ni, Q., Lin, D., Bertino, E.: Multi-domain and Privacy-aware Role Based Access Control in eHealth. Computer Science. Purdue University, USA (2008)","DOI":"10.4108\/ICST.PERVASIVEHEALTH2008.2504"},{"key":"84_CR8","unstructured":"Goldsmith, M.: FDR2 User\u2019s Manual Version 2.82. Formal System (Europe) Ltd."}],"container-title":["IFIP Advances in Information and Communication Technology","Collaborative Networks for a Sustainable World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15961-9_84.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:43:49Z","timestamp":1606167829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15961-9_84"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642159602","9783642159619"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15961-9_84","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}