{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:32:19Z","timestamp":1744173139454,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_5","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T08:27:01Z","timestamp":1348129621000},"page":"68-79","source":"Crossref","is-referenced-by-count":4,"title":["Usage Control Model Specification in XACML Policy Language"],"prefix":"10.1007","author":[{"family":"Um-e-Ghazia","sequence":"first","affiliation":[]},{"given":"Rahat","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Muhammad Awais","family":"Shibli","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Bilal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R.: Towards Usage Control Models: Beyond Traditional Access Control. In: SACMAT 2002 Proceedings of 7th ACM Symposium on Access Control Models and Technologies (2002)","DOI":"10.1145\/507721.507722"},{"key":"5_CR2","unstructured":"Zhang, X.: Formal model and analysis of usage control, PhD Thesis. George Mason University, Fairfax, USA (2006)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Lazouski, A., Martinelli, F., Moore, P.M.: Usage control in computer security: A survey. Elsevier Journal of Computer Science Review\u00a04(2) (2010)","DOI":"10.1016\/j.cosrev.2010.02.002"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R.: The UCON ABC Usage Control Model. Journal of ACM Transactions on Information and System Security\u00a07(1) (2004)","DOI":"10.1145\/984334.984339"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, X., Nakae, M., Covington, M., Sandhu, R.: Toward a Usage-Based Security Framework for Collaborative Computing Systems. Journal of ACM Transactions on Information and System Security\u00a011(1) (2008)","DOI":"10.1145\/1330295.1330298"},{"key":"5_CR6","unstructured":"Kumaraguru, P., Cranor, L.F.: A Survey of privacy policy languages. In: SOUPS 2007 Proceedings of Third Symposium on Usable Privacy and Security (2007)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Gouglidis, A., Mavridis, I.: On the Definition of Access Control Requirements for Grid and Cloud Computing Systems. In: GridNets 2009 Third International ICST Conference (2009)","DOI":"10.1007\/978-3-642-11733-6_3"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, X., Parisi-Presicce, F., Park, J., Sandhu, R.: A Logical Specification of Usage Control. In: SACMAT 2004 ACM Transactions on Information and System Security (2000)","DOI":"10.1145\/990036.990038"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-642-04474-8_31","volume-title":"Information Security","author":"J. Lu","year":"2009","unstructured":"Lu, J., Li, R., Varadharajan, V., Lu, Z., Ma, X.: Secure Interoperation in Multidomain Environments Employing UCON Policies. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 395\u2013402. Springer, Heidelberg (2009)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Elsevier Journal of Network and Computer Applications\u00a034(1) (2010)","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"5_CR11","unstructured":"Haidar, D.A., CuppensBoulahia, N., Cuppens, F., Debar, H.: An Extended RBAC profile in XACML. In: SWS 2006 Proceedings of the 3rd ACM Workshop on Secure Web Services (2006)"},{"key":"5_CR12","unstructured":"Chen, D., Huang, X., Ren, X.: Access Control of Cloud Services Based on UCON. In: CloudCom 2009 Proceedings of the 1st International Conference on Cloud Computing (2009)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Ali, T., Nauman, M., Fazl-e-Hadi, Muhaya, F.B.: On Usage Control of Multimedia Content in and through Cloud Computing Paradigm. In: 5th International Conference on Future Information Technology (2010)","DOI":"10.1109\/FUTURETECH.2010.5482751"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Katt, B., Zhang, X., Breu, R., Hafner, M., Seifert, J.-P.: A General Obligation Model and Continuity-Enhanced Policy Enforcement Engine for Usage Control. In: SACMAT 2008 Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (2008)","DOI":"10.1145\/1377836.1377856"},{"key":"5_CR15","unstructured":"xacml-3.0 core specifications, eXtensible Access Control Markup Language (XACML) Version 3.0 (April 2012), http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-en.pdf"},{"key":"5_CR16","unstructured":"xacml-3.0 rbac specifications, XACML v3.0 Core and Hierarchical Role Based Access Control (RBAC) Profile Version 1.0 (August 2010), http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-rbac-v1-spec-cs-01-en.pdf"},{"key":"5_CR17","unstructured":"A Brief Introduction to XACML, http:\/\/www.oasis-open.org\/committees\/download.php\/2713\/Brief_Introduction_to_XACML.html"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:21:06Z","timestamp":1744165266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}