{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:46:07Z","timestamp":1725702367526},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_10","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T08:27:01Z","timestamp":1348129621000},"page":"123-134","source":"Crossref","is-referenced-by-count":0,"title":["Role Approach in Access Control Development with the Usage Control Concept"],"prefix":"10.1007","author":[{"given":"Aneta","family":"Poniszewska-Maranda","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Role-Based Access control. ACM TISSEC (2001)","DOI":"10.1145\/501978.501980"},{"key":"10_CR2","unstructured":"OMG Unified Modeling Language (OMG UML): Superstructure. Version 2.2, The Object Management Group (February 2009)"},{"key":"10_CR3","series-title":"IFIP","first-page":"15","volume-title":"Data and Applications Security XVIII","author":"J. Park","year":"2004","unstructured":"Park, J., Zhang, X., Sandhu, R.: Attribute Mutability in Usage Control. In: Farkas, C., Samarati, P. (eds.) Data and Applications Security XVIII. IFIP, vol.\u00a0144, pp. 15\u201329. Springer, Boston (2004)"},{"issue":"2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cosrev.2010.02.002","volume":"4","author":"A. Lazouski","year":"2010","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: A survey. Computer Science Review\u00a04(2), 81\u201399 (2010)","journal-title":"Computer Science Review"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Communications of the ACM\u00a049(9) (September 2006)","DOI":"10.1145\/1151030.1151053"},{"issue":"4","key":"10_CR6","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X. Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM TISSEC\u00a08(4), 351\u2013387 (2005)","journal-title":"ACM TISSEC"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Goncalves, G., Poniszewska-Maranda, A.: Role engineering: from design to evaluation of security schemas. Journal of Systems and Software\u00a081(8)","DOI":"10.1016\/j.jss.2007.11.003"},{"issue":"2-3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11235-009-9243-0","volume":"45","author":"A. Poniszewska-Maranda","year":"2010","unstructured":"Poniszewska-Maranda, A.: Conception Approach of Access Control in Heterogeneous Information Systems using UML. Journal of Telecommunication Systems\u00a045(2-3), 177\u2013190 (2010)","journal-title":"Journal of Telecommunication Systems"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Neumann, G., Strembeck, M.: A Scenario-driven Role Engineering Process for Functional RBAC Roles. In: Proc. of 7th ACM SACMAT, USA (June 2002)","DOI":"10.1145\/507716.507717"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Strembeck, M.: Scenario-Driven Role Engineering. IEEE Security & Privacy\u00a08(1) (January\/February 2010)","DOI":"10.1109\/MSP.2010.46"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Strembeck, M., Neumann, G.: An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments. ACM TISSEC\u00a07(3) (2004)","DOI":"10.1145\/1015040.1015043"},{"key":"10_CR12","unstructured":"Coyne, E.J., Davis, J.M.: Role Engineering for Enterprise Security Management. Artech House (2008)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM TISSEC\u00a02(1)","DOI":"10.1145\/300830.300837"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Hawkins, J.C.: Determining Role Rights from Use Cases. In: Proc. of 2nd ACM Workshop on Role-Based Access Control (RBAC), USA (1997)","DOI":"10.1145\/266741.266767"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering Methodology\u00a015, 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering Methodology"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Coyne, E.J.: Role engineering. In: Proc. of the ACM Workshop on Role-Based Access Control (1996)","DOI":"10.1145\/270152.270159"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Epstein, P., Sandhu, R.: Towards a UML Based Approach to Role Engineering. In: Proc. of the ACM Workshop on Role-Based Access Control (1999)","DOI":"10.1145\/319171.319184"},{"key":"10_CR18","unstructured":"Epstein, P., Sandhu, R.: Engineering of Role-Permission Assignment to Role Engineering. In: Proc. of 17th ACSAC (2001)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Roeckle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding to implement Role-based security administration in a large industrial organization. In: Proc. of ACM Workshop on role-Based Access Control (2000)","DOI":"10.1145\/344287.344308"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-25261-7_5","volume-title":"Security and Intelligent Information Systems","author":"A. Poniszewska-Maranda","year":"2012","unstructured":"Poniszewska-Maranda, A.: Implementation of Access Control Model for Distributed Information Systems Using Usage Control. In: Bouvry, P., K\u0142opotek, M.A., Lepr\u00e9vost, F., Marciniak, M., Mykowiecka, A., Rybi\u0144ski, H. (eds.) SIIS 2011. LNCS, vol.\u00a07053, pp. 54\u201367. Springer, Heidelberg (2012)"},{"key":"10_CR21","unstructured":"Poniszewska-Maranda, A.: Administration of access control in information systems using URBAC model. Journal of Applied Computer Science\u00a019(2) (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:00:25Z","timestamp":1620129625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}