{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:17:35Z","timestamp":1725567455365},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642162886"},{"type":"electronic","value":"9783642162893"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16289-3_16","type":"book-chapter","created":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T10:04:06Z","timestamp":1286186646000},"page":"179-193","source":"Crossref","is-referenced-by-count":0,"title":["Defining Access Control Rules with Conditions"],"prefix":"10.1007","author":[{"given":"Mark H.","family":"Linehan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Prabir, N., et al.: Data4BPM Part 1: Introducing Business Entities and the Business Entity Definition Language (BEDL). IBM developerWorks, \n                    \n                      http:\/\/www.ibm.com\/developerworks\/websphere\/library\/techarticles\/1004_nandi\/1004_nandi.html"},{"issue":"3","key":"16_CR2","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1147\/sj.423.0428","volume":"42","author":"A. Nigam","year":"2003","unstructured":"Nigam, A., Caswell, N.S.: Business artifacts: An approach to operational specification. IBM Systems Journal\u00a042(3), 428\u2013445 (2003)","journal-title":"IBM Systems Journal"},{"key":"16_CR3","unstructured":"Nandi, P., Kumaran, S.: Adaptive Business Object: A New Component Model for Business Integration. In: Proceedings of International Conference on Enterprise Information Systems, ICEIS (2005)"},{"key":"16_CR4","unstructured":"Kumaran, S.: Model Driven Enterprise. In: Proceedings of Global Integration Summit, Banff, Canada (2004)"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/978-3-540-88873-4_17","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"R. Hull","year":"2008","unstructured":"Hull, R.: Artifact-centric Business Process Models: Brief Survey of Research Results and Challenges. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol.\u00a05332, pp. 1152\u20131163. Springer, Heidelberg (2008)"},{"key":"16_CR6","unstructured":"Object Modeling Group (OMG): Business Process Modeling Notation Version 2.0 Beta 1, \n                    \n                      http:\/\/www.omg.org\/spec\/BPMN\/2.0\/"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","first-page":"128","volume-title":"Rule Representation, Interchange and Reasoning on the Web","author":"M. Linehan","year":"2008","unstructured":"Linehan, M.: SBVR Use Cases. In: Bassiliades, N., Governatori, G., Paschke, A. (eds.) RuleML 2008. LNCS, vol.\u00a05321, pp. 128\u2013196. Springer, Heidelberg (2008)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Linehan, M.: Ontologies and Rules in Business Models. In: Proceedings of the 2007 Eleventh International IEEE EDOC Conference Workshop, pp. 149\u2013156 (2007)","DOI":"10.1109\/EDOCW.2007.23"},{"key":"16_CR9","unstructured":"InterNational Committee for Information Technology Standards, Information Technology - Role Based Access Control, ANSI\/INCITS 359-2004 (2004), \n                    \n                      http:\/\/www.techstreet.com\/standards\/INCITS\/359_2004?product_id=1151353"},{"key":"16_CR10","unstructured":"National Institute of Standards and Technology (NIST), Role Based Access Control (RBAC)\u00a0 and Role Based Security, \n                    \n                      http:\/\/csrc.nist.gov\/groups\/SNS\/rbac\/"},{"key":"16_CR11","unstructured":"Object Modeling Group (OMG): Semantics of Business Vocabulary and Business Rules Specification, Version 1.0 (2007), \n                    \n                      http:\/\/www.omg.org\/spec\/SBVR\/1.0\/"},{"key":"16_CR12","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML), version 2.0 (2005), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"16_CR13","unstructured":"OASIS: Core and hierarchical role based access control (RBAC) profile of XACML 2.0 (2005), \n                    \n                      http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-rbac-profile1-spec-os.pdf"},{"key":"16_CR14","volume-title":"Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT)","author":"S. Barker","year":"2009","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, New York (2009), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm?id=1542207.1542238&coll=ACM&dl=ACM&CFID=98850045&CFTOKEN=13091977"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-75975-1_4","volume-title":"Advances in Rule Interchange and Applications","author":"S. Goedertier","year":"2007","unstructured":"Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol.\u00a04824, pp. 39\u201352. Springer, Heidelberg (2007), \n                    \n                      http:\/\/www.econ.kuleuven.be\/tew\/academic\/infosys\/RESEARCH\/PROLOGA\/refsdtpubs\/ProcessAwareRules.pdf"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-540-78238-4_50","volume-title":"Business Process Management Workshops","author":"S. Goedertier","year":"2008","unstructured":"Goedertier, S., Vanthienen, J.: EM-BrA2CE v0.2: A vocabulary and execution model for declarative business process modeling. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol.\u00a04928, pp. 496\u2013501. Springer, Heidelberg (2008)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Vanthienen, J., Dries, E.: Illustration of a Decision Table Tool for Specifying and Implementing Knowledge Based Systems. In: Fifth International Conference on Tools with Artificial Intelligence (TAI), pp. 198\u2013205 (1993)","DOI":"10.1109\/TAI.1993.633957"}],"container-title":["Lecture Notes in Computer Science","Semantic Web Rules"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16289-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T14:28:46Z","timestamp":1553178526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16289-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642162886","9783642162893"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16289-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}