{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T05:40:11Z","timestamp":1741930811186,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_2","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:31:18Z","timestamp":1321547478000},"page":"26-36","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of Document Access Control Model Based on Role and Security Policy"],"prefix":"10.1007","author":[{"given":"Liangjian","family":"Mao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuzhen","family":"Yao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Yu, Y., Chiueh, T.C.: A solution against information theft due to insider attack. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 31\u201339 (2004)","DOI":"10.1145\/1029146.1029154"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Lzaki, K., Tanaka, K.: Information flow control in role-based model for distributed objects. In: Parallel and Distributed Systems, pp. 363\u2013370 (2001)","DOI":"10.1109\/ICPADS.2001.934841"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Pramanik, S., Sankaranarayanan, V., Upadhyaya, S.: Security Policies to Mitigate Insider Threat in the Document Control Domain. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), pp. 304\u2013313 (2004)","DOI":"10.1109\/CSAC.2004.35"},{"key":"2_CR4","unstructured":"Suranjan, P., Vidyaraman, S., Shambhu, U.: Security Policies to Mitigate Insider Threat in the Document Control Domain. In: Proceedings of the 20th Annual Computer Security Applications Conference, pp. 304\u2013313 (2004)"},{"key":"2_CR5","unstructured":"Microsoft Windows Rights Management Services for Windows Server 2003 - Helping Organizations Safeguard Digital Information from Unauthorized Use (October 2003)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-11207-2_11","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"A. Gabillon","year":"2010","unstructured":"Gabillon, A., Capolsini, P.: Dynamic Security Rules for Geo Data. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) DPM 2009. LNCS, vol.\u00a05939, pp. 136\u2013152. Springer, Heidelberg (2010)"},{"key":"2_CR7","unstructured":"Sun Microsystems, cs-xacml-rbac-profile-01, XACML Profile for Role Based Access Control (RBAC) (2004), http:\/\/docs.oasis-open.org\/xacml\/cd-xacml-rbac-profile-01.pdf"},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control. ACM Transactions on Information and System Security\u00a04(3), 191\u2013223 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Gavrila, S.L., Barkley, J.F.: Formal Specification for Role Based Access Control User\/Role and Role\/Role Relationship Management. In: Proceedings of Third ACM Workshop on Role-Based Access Control, pp. 81\u201390 (1998)","DOI":"10.1145\/286884.286902"},{"key":"2_CR10","unstructured":"Barkley, D.: Countering the Threat from Malicious Insiders.In: Computer Security Applications Conference, pp. 6\u201310 (2004)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Bhamidipati, V.: The ARBAC97 Model for Role-Based Administration of Roles. In: Proceeding of the Second ACM Workshop on Role-Based Access Control, pp. 41\u201350 (1997)","DOI":"10.1145\/266741.266752"},{"key":"2_CR12","unstructured":"Steve, Z.: Challenges for information-flow security. Proceeding of the 1st International"},{"key":"2_CR13","unstructured":"Technical Overview of Windows Rights Management Services for Windows Server 2003. White paper. Microsoft Corporation (November 2003)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T05:27:32Z","timestamp":1741930052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}