{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:41:19Z","timestamp":1773974479780,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642281655","type":"print"},{"value":"9783642281662","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28166-2_7","type":"book-chapter","created":{"date-parts":[[2012,2,9]],"date-time":"2012-02-09T21:49:28Z","timestamp":1328824168000},"page":"60-74","source":"Crossref","is-referenced-by-count":21,"title":["Formalisation and Implementation of the XACML Access Control Mechanism"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Masi","sequence":"first","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Tiezzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Ferraiolo, D., Kuhn, R.: Role-based access control. In: NIST-NCSC National Computer Security Conference, pp. 554\u2013563 (1992)"},{"key":"7_CR2","unstructured":"NIST: A survey of access control models (2009), http:\/\/csrc.nist.gov\/news_events\/privilege-management-workshop\/PvM-Model-Survey-Aug26-2009.pdf"},{"key":"7_CR3","unstructured":"OASIS XACML TC: eXtensible Access Control Markup Language (XACML) version 2.0 (2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/XACML-2.0-OS-NORMATIVE.zip"},{"key":"7_CR4","unstructured":"The epSOS project: A european ehealth project, http:\/\/www.epsos.eu"},{"key":"7_CR5","unstructured":"The Nationwide Health Information Network (NHIN): an American eHealth Project (2009), http:\/\/healthit.hhs.gov\/portal\/server.pt"},{"key":"7_CR6","unstructured":"OASIS: Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of XACML v2.0 for Healthcare v1.0 (2009), http:\/\/www.oasis-open.org"},{"key":"7_CR7","unstructured":"OASIS Security Services TC: Assertions and protocols for the OASIS security assertion markup language (SAML) v2.02 (2005), http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf"},{"key":"7_CR8","unstructured":"Namli, T., Dogac, A.: Implementation Experiences On IHE XUA and BPPC. Technical report, Software Research and Development Center, Middle East Technical University Ankara (December 2006)"},{"key":"7_CR9","unstructured":"Universidad de Murcia: UMU-XACML-Editor (2008), http:\/\/sourceforge.net\/projects\/umu-xacmleditor\/"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Bradner, S.: Key words for use in rfcs to indicate requirement levels (1997)","DOI":"10.17487\/rfc2119"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kolovski, V., Hendler, J.A., Parsia, B.: Analyzing web access control policies. In: WWW, pp. 677\u2013686. ACM (2007)","DOI":"10.1145\/1242572.1242664"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Bryans, J.: Reasoning about XACML policies using CSP. In: SWS, pp. 28\u201335. ACM (2005)","DOI":"10.1145\/1103022.1103028"},{"key":"7_CR13","unstructured":"Hoare, C.: Commmunicating Sequential Processes. Prentice-Hall (1985)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-76650-6_4","volume-title":"Formal Methods and Software Engineering","author":"J. Bryans","year":"2007","unstructured":"Bryans, J., Fitzgerald, J.S.: Formal Engineering of XACML Access Control Policies in VDM++. In: Butler, M., Hinchey, M.G., Larrondo-Petrie, M.M. (eds.) ICFEM 2007. LNCS, vol.\u00a04789, pp. 37\u201356. Springer, Heidelberg (2007)"},{"key":"7_CR15","volume-title":"Validated Designs for Object-oriented Systems","author":"J. Fitzgerald","year":"2005","unstructured":"Fitzgerald, J., Larsen, P., Mukherjee, P., Plat, N., Verhoef, M.: Validated Designs for Object-oriented Systems. Springer, Heidelberg (2005)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/11556992_32","volume-title":"Information Security","author":"N. Zhang","year":"2005","unstructured":"Zhang, N., Ryan, M., Guelev, D.P.: Evaluating Access Control Policies through Model Checking. In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 446\u2013460. Springer, Heidelberg (2005)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, N., Ryan, M., Guelev, D.P.: Synthesising verified access control systems in XACML. In: FMSE, pp. 56\u201365. ACM (2004)","DOI":"10.1145\/1029133.1029141"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: ICSE, pp. 196\u2013205. ACM (2005)","DOI":"10.1145\/1062455.1062502"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In: SACMAT, pp. 160\u2013169. ACM (2006)","DOI":"10.1145\/1133058.1133081"},{"key":"7_CR20","unstructured":"OASIS XACML TC: Available XACML Implementations (2011), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml#other (last visited September 21, 2011)"},{"key":"7_CR21","unstructured":"Proctor, S.: SUN XACML (2011), http:\/\/sunxacml.sf.net (last visited September 21, 2011)"},{"key":"7_CR22","unstructured":"The Herasaf consortium: HERASAF, http:\/\/www.herasaf.org"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Liu, A.X., Chen, F., Hwang, J., Xie, T.: Xengine: a fast and scalable XACML policy evaluation engine. In: SIGMETRICS, pp. 265\u2013276. ACM (2008)","DOI":"10.1145\/1375457.1375488"},{"key":"7_CR24","unstructured":"ISSRG: The Modular PERMIS Project, http:\/\/sec.cs.kent.ac.uk\/permis\/"},{"issue":"4","key":"7_CR25","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11390-006-0513-y","volume":"21","author":"I.T. Foster","year":"2006","unstructured":"Foster, I.T.: Globus toolkit version 4: Software for service-oriented systems. J. Comput. Sci. Technol.\u00a021(4), 513\u2013520 (2006)","journal-title":"J. Comput. Sci. Technol."},{"key":"7_CR26","unstructured":"Barton, T., et al.: Identity federation and attribute-based authorization through the globus toolkit, shibboleth, gridshib, and myproxy. Technical report, National Center for Supercomputing Applications, University of Illinois (2006)"},{"issue":"11","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1002\/cpe.1313","volume":"20","author":"D.W. Chadwick","year":"2008","unstructured":"Chadwick, D.W., Zhao, G., Otenko, S., Laborde, R., Su, L., Nguyen, T.A.: Permis: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience\u00a020(11), 1341\u20131357 (2008)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and Implementation of the XACML Access Control Mechanism (full version). Technical report, Dipartimento di Sistemi e Informatica, Univ. Firenze (2011), http:\/\/rap.dsi.unifi.it\/xacml_tools","DOI":"10.1007\/978-3-642-28166-2_7"},{"key":"7_CR29","unstructured":"Clark, J., DeRose, S.: XML Path Language (XPath) version 1.0 (1999), http:\/\/www.w3.org\/TR\/xpath"},{"key":"7_CR30","unstructured":"The IHE Initiative: IT Infrastructure Technical Framework (2009), http:\/\/www.ihe.net"},{"key":"7_CR31","unstructured":"Health Level Seven organization: Hl7 standards (2009), http:\/\/www.hl7.org"},{"key":"7_CR32","unstructured":"The Regenstrief Institute: Logical observation identifiers names and codes (LOINC), http:\/\/www.loinc.org"},{"key":"7_CR33","unstructured":"IEEE Computer Society: IEEE Standard for Binary Floating-Point Arithmetic IEEE Product No. SH10116-TBR (1985)"},{"key":"7_CR34","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1002\/spe.4380250705","volume":"25","author":"T.J. Parr","year":"1994","unstructured":"Parr, T.J., Quong, R.W.: ANTLR: A Predicated-LL(k) Parser Generator. Software Practice and Experience\u00a025, 789\u2013810 (1994)","journal-title":"Software Practice and Experience"},{"key":"7_CR35","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/361011.361067","volume":"17","author":"J.H. Saltzer","year":"1974","unstructured":"Saltzer, J.H.: Protection and the Control of Information Sharing in Multics. Commun. ACM\u00a017, 388\u2013402 (1974)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28166-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,23]],"date-time":"2019-06-23T08:15:57Z","timestamp":1561277757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28166-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642281655","9783642281662"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28166-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}