{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:31:32Z","timestamp":1725622292563},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642250927"},{"type":"electronic","value":"9783642250934"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25093-4_21","type":"book-chapter","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T00:58:29Z","timestamp":1318899509000},"page":"293-300","source":"Crossref","is-referenced-by-count":0,"title":["DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"Kirrane","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Javanmardi, S., Amini, M., Jalili, R., GanjiSaffar, Y.: SBAC: A Semantic Based Access Control Model. In: 11th Nordic Workshop on Secure IT-systems (NordSec 2006), Linkping, Sweden (2006)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Kichkaylo, T., Neches, R.: Access Control Policies for Semantic Networks. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 150\u2013157. IEEE (July 2009)","DOI":"10.1109\/POLICY.2009.11"},{"issue":"4","key":"21_CR3","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1049\/iet-ifs.2009.0198","volume":"4","author":"M. Amini","year":"2010","unstructured":"Amini, M., Jalili, R.: Multi-level authorisation model and framework for distributed semantic-aware environments. IET Information Security\u00a04(4), 301 (2010)","journal-title":"IET Information Security"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Qin, L., Atluri, V.: Concept-level access control for the Semantic Web. In: Proceedings of the 2003 ACM Workshop on XML Security - XMLSEC 2003, Number Cimic, p. 94. ACM Press (2003)","DOI":"10.1145\/968559.968575"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-04581-3_4","volume-title":"Semantic Techniques for the Web","author":"P.A. Bonatti","year":"2009","unstructured":"Bonatti, P.A., De Coi, J.L., Olmedilla, D., Sauro, L.: Rule-Based Policy Representations and Reasoning. In: Bry, F., Ma\u0142uszy\u0144ski, J. (eds.) Semantic Techniques for the Web. LNCS, vol.\u00a05500, pp. 201\u2013232. Springer, Heidelberg (2009)"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K. Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.: A design science research methodology for information systems research. Management Information Systems\u00a024, 45\u201377 (2007)","journal-title":"Management Information Systems"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1023\/A:1022908820784","volume":"11","author":"P. Checkland","year":"1998","unstructured":"Checkland, P., Holwell, S.: Action Research: Its Nature and Validity. Systemic Practice and Action Research\u00a011(1), 9\u201321 (1998)","journal-title":"Systemic Practice and Action Research"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control: a multi-dimensional view. In: Tenth Annual Computer Security Applications Conference, pp. 54\u201362 (1994)","DOI":"10.1109\/CSAC.1994.367293"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Thomas, R., Sandhu, R.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. Database Security, 166\u2013181 (1998)","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"McCollum, C., Messing, J., Notargiacomo, L.: Beyond the pale of MAC and DAC-defining new forms of access control. In: Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990, pp. 190\u2013200. IEEE (1990)","DOI":"10.1109\/RISP.1990.63850"},{"key":"21_CR11","unstructured":"Yague, M., Ma\u00f1a, A., L\u00f3pez, J., Troya, J.: Applying the semantic web layers to access control. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications, 2003, pp. 622\u2013626. IEEE (2003)"},{"key":"21_CR12","unstructured":"Bradshaw, J., Dutfield, S., Benoit, P., Woolley, J.: KAoS: Toward an industrial-strength open agent architecture. In: Software Agents, pp. 375\u2013418 (1997)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T.: A policy language for a pervasive computing environment. In: Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 63\u201374. IEEE Comput. Soc. (2003)","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Kolovski, V., Hendler, J., Parsia, B.: Analyzing web access control policies. In: Proceedings of the 16th International Conference on World Wide Web WWW 2007, p. 677 (2007)","DOI":"10.1145\/1242572.1242664"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web \u2013 ISWC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25093-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T17:16:36Z","timestamp":1560791796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25093-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642250927","9783642250934"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25093-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}