{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:40:09Z","timestamp":1744069209306,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333828"},{"type":"electronic","value":"9783642333835"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33383-5_20","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T02:51:51Z","timestamp":1346899911000},"page":"322-337","source":"Crossref","is-referenced-by-count":2,"title":["OSDM: An Organizational Supervised Delegation Model for RBAC"],"prefix":"10.1007","author":[{"given":"Nezar","family":"Nassr","sequence":"first","affiliation":[]},{"given":"Nidal","family":"Aboudagga","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Steegmans","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Ferraiolo, D., Kuhn, D.: Role-based access control. In: Proceedings of the 15th National Computer Security Conference (1992)"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10207-007-0044-8","volume":"7","author":"J. Crampton","year":"2008","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in role-based access control. Int. J. Inf. Sec.\u00a07(2), 123\u2013136 (2008)","journal-title":"Int. J. Inf. Sec."},{"key":"20_CR3","unstructured":"Barka, E., Sandhu, R.: A Role-based Delegation Model and Some Extensions. In: Proceedings of 23rd National Information System Security Conference, Baltimore, pp. 101\u2013114 (2000)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11863908_12","volume-title":"Computer Security \u2013 ESORICS 2006","author":"J. Crampton","year":"2006","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in Role-Based Access Control. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 174\u2013191. Springer, Heidelberg (2006)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, L., Ahn, G., Chu, B.: A Rule-based framework for role-based delegation. In: Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, pp. 153\u2013162 (2001)","DOI":"10.1145\/373256.373289"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/775412.775431","volume-title":"Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT 2003)","author":"X. Zhang","year":"2003","unstructured":"Zhang, X., Oh, S., Sandhu, R.: PBDM: a flexible delegation model in RBAC. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT 2003), pp. 149\u2013157. ACM, New York (2003)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1809842.1809861","volume-title":"Proceedings of the 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010)","author":"K. Hasebe","year":"2010","unstructured":"Hasebe, K., Mabuchi, M., Matsushita, A.: Capability-based delegation model in RBAC. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), pp. 109\u2013118. ACM, New York (2010)"},{"key":"20_CR8","unstructured":"Schermerhorn, J., Osborn, R., Uhl-Bien, M.: Organizational Behavior, 12th edn., p. 377. Wiley (2011)"},{"issue":"7","key":"20_CR9","doi-asserted-by":"crossref","first-page":"852","DOI":"10.1287\/mnsc.48.7.852.2821","volume":"48","author":"M. Harris","year":"2002","unstructured":"Harris, M., Raviv, A.: Organization Design. Management Science INFORMS\u00a048(7), 852\u2013865 (2002)","journal-title":"Management Science INFORMS"},{"issue":"8","key":"20_CR10","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Wood, C., Fernandez, E.B.: Authorization in a Decentralized Database System. In: Proceedings of the 5th International Conference on Very Large Databases, Rio de Janeiro, pp. 352\u2013359 (1979)","DOI":"10.1109\/VLDB.1979.718151"},{"issue":"3","key":"20_CR12","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/320473.320482","volume":"1","author":"P.A. Griffiths","year":"1976","unstructured":"Griffiths, P.A., Wade, B.W.: An Authorization Mechanism for a Relational Database System. ACM Transactions on Database Systems (TODS) TODS Homepage Archive\u00a01(3), 242\u2013255 (1976)","journal-title":"ACM Transactions on Database Systems (TODS) TODS Homepage Archive"},{"issue":"4","key":"20_CR13","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1109\/69.617060","volume":"9","author":"I. Majetic","year":"1997","unstructured":"Majetic, I., Leiss, E.L.: Authorization and Revocation in Object-Oriented Databases. IEEE Transactions on Knowledge and Data Engineering\u00a09(4), 668\u2013672 (1997)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"20_CR14","volume-title":"Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000)","author":"E. Barka","year":"2000","unstructured":"Barka, E., Sandhu, R.: Framework for role-based delegation models. In: Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000). IEEE Computer Society, Washington, DC (2000)"},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L. Zhang","year":"2003","unstructured":"Zhang, L., Ahn, G., Chu, B.: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur.\u00a06(3), 404\u2013441 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models, CA, USA, pp. 38\u201347. IEEE Computer Society (1996)","DOI":"10.1109\/2.485845"},{"key":"20_CR17","unstructured":"Fernandez, E.B., Wu, J., Fernandez, M.H.: User group structures in object-oriented databases. In: Proc. 8th Annual IFIP W.G.11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany. Database Security, VIII - Status and prospects, vol.\u00a060, pp. 57\u201376 (August 1994)"},{"key":"20_CR18","unstructured":"ANSI INCITS 359, Standard for Role Based Access Control (2004)"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1007\/11558958_123","volume-title":"Applied Parallel Computing. State of the Art in Scientific Computing","author":"H.-H. Lee","year":"2006","unstructured":"Lee, H.-H., Lee, Y.L., Noh, B.-N.: A Framework for Modeling Organization Structure in Role Engineering. In: Dongarra, J., Madsen, K., Wa\u015bniewski, J. (eds.) PARA 2004. LNCS, vol.\u00a03732, pp. 1017\u20131024. Springer, Heidelberg (2006)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-30955-7_11","volume-title":"Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems","author":"N. Nassr","year":"2012","unstructured":"Nassr, N., Steegmans, E.: ROAC: A Role-Oriented Access Control Model. In: Askoxylakis, I., P\u00f6hls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol.\u00a07322, pp. 113\u2013127. Springer, Heidelberg (2012)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"OMG: The Unified Modelling Language. OMG Available Spec. Version 2.2 (February 2009), http:\/\/www.omg.org\/spec\/UML\/2.2\/","DOI":"10.1299\/jsmermd.2009._2A1-C20_1"},{"key":"20_CR22","unstructured":"OMG: Object Constraint Language. OMG Available Spec. Version 2.0 (May 2006), http:\/\/www.omg.org\/spec\/OCL\/2.0\/"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/319171.319186","volume-title":"Proceedings of the Fourth ACM Workshop on Role-Based Access Control (RBAC 1999)","author":"J. Moffett","year":"1999","unstructured":"Moffett, J., Lupu, E.: The uses of role hierarchies in access control. In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control (RBAC 1999), pp. 153\u2013160. ACM, New York (1999)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33383-5_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:01:59Z","timestamp":1744066919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33383-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333828","9783642333835"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33383-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}