{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:12:08Z","timestamp":1725657128073},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642274459"},{"type":"electronic","value":"9783642274466"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27446-6_3","type":"book-chapter","created":{"date-parts":[[2012,2,4]],"date-time":"2012-02-04T03:06:42Z","timestamp":1328324802000},"page":"23-33","source":"Crossref","is-referenced-by-count":0,"title":["Access Control Management Using Extended RBAC Model"],"prefix":"10.1007","author":[{"given":"Aneta","family":"Poniszewska-Maranda","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press, Addison-Wesley (1994)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Munawer, Q.: How to do Discretionary Access Control Using Roles. In: Proceeding of 3rd ACM Workshop on Role-Based Access Control (1998)","DOI":"10.1145\/286884.286893"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST Role-Based Access Control. ACM Transactions on Information and Systems Security TISSEC\u00a04(3) (2001)","DOI":"10.1145\/501978.501980"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Goncalves, G., Poniszewska-Maranda, A.: Role engineering: from design to evaluation of security schemas. Journal of Systems and Software\u00a081 (2008)","DOI":"10.1016\/j.jss.2007.11.003"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-540-30577-4_51","volume-title":"SOFSEM 2005: Theory and Practice of Computer Science","author":"A. Poniszewska-Maranda","year":"2005","unstructured":"Poniszewska-Maranda, A., Goncalves, G., Hemery, F.: Representation of Extended RBAC Model Using UML Language. In: Vojt\u00e1\u0161, P., Bielikov\u00e1, M., Charron-Bost, B., S\u00fdkora, O. (eds.) SOFSEM 2005. LNCS, vol.\u00a03381, pp. 413\u2013417. Springer, Heidelberg (2005)"},{"key":"3_CR6","unstructured":"Poniszewska-Mara\u0144da, A.: Conception Approach of Access Control in Heterogeneous Information Systems using UML. Journal of Telecommunication Systems\u00a044 (2010)"},{"issue":"9","key":"3_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R. Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, P.: Access control: Principles and practice. IEEE Communication\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communication"}],"container-title":["Studies in Computational Intelligence","Towards Modern Collaborative Knowledge Sharing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27446-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T07:51:13Z","timestamp":1620028273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27446-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642274459","9783642274466"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27446-6_3","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2012]]}}}