{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:13:06Z","timestamp":1725455586833},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351297"},{"type":"electronic","value":"9783642351303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35130-3_5","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T07:09:45Z","timestamp":1355123385000},"page":"59-74","source":"Crossref","is-referenced-by-count":14,"title":["Risk-Aware RBAC Sessions"],"prefix":"10.1007","author":[{"given":"Khalid Zaman","family":"Bijon","sequence":"first","affiliation":[]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-03007-9_4","volume-title":"Data and Applications Security XXIII","author":"F. Autrel","year":"2009","unstructured":"Autrel, F., Cuppens-Boulahia, N., Cuppens, F.: Reaction Policy Model Based on Dynamic Organizations and Threat Context. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security 2009. LNCS, vol.\u00a05645, pp. 49\u201364. Springer, Heidelberg (2009)"},{"key":"5_CR2","first-page":"167","volume-title":"SACMAT 2012","author":"N. Baracaldo","year":"2012","unstructured":"Baracaldo, N., Joshi, J.: A trust-and-risk aware rbac framework: tackling insider threat. In: SACMAT 2012, pp. 167\u2013176. ACM, New York (2012)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-29963-6_11","volume-title":"Security and Trust Management","author":"L. Chen","year":"2012","unstructured":"Chen, L., Crampton, J.: Risk-Aware Role-Based Access Control. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol.\u00a07170, pp. 140\u2013156. Springer, Heidelberg (2012)"},{"key":"5_CR4","unstructured":"Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P., Wagner, G., Reninger, A.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: Security and Privacy, 2007, pp. 222\u2013230 (May 2007)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Debar, H., Thomas, Y., Cuppens, F., Cuppens-Boulahia, N.: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology, 195\u2013210 (2007)","DOI":"10.1007\/s11416-007-0039-z"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Tran. Inf. Sys. Sec. (2001)","DOI":"10.1145\/501978.501980"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Kandala, S., Sandhu, R., Bhamidipati, V.: An attribute based framework for risk-adaptive access control models. In: Avail., Reliab. and Sec., ARES (August 2011)","DOI":"10.1109\/ARES.2011.41"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Molloy, I., Dickens, L., Morisset, C., Cheng, P.-C., Lobo, J., Russo, A.: Risk-based security decisions under uncertainty. In: CODASPY 2012 (2012)","DOI":"10.1145\/2133601.2133622"},{"key":"5_CR9","first-page":"250","volume-title":"ASIACCS 2010","author":"Q. Ni","year":"2010","unstructured":"Ni, Q., Bertino, E., Lobo, J.: Risk-based access control systems built on fuzzy inferences. In: ASIACCS 2010, pp. 250\u2013260. ACM, New York (2010)"},{"key":"5_CR10","unstructured":"M. C. J. P. Office: Horizontal integration: Broader access models for realizing information dominance. MITRE Corporation, Tech. Rep. JSR-04-132 (2004)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Salim, F., Reid, J., Dawson, E., Dulleck, U.: An approach to access control under uncertainty. In: Avail., Reliab. and Sec., ARES, pp. 1\u20138 (August 2011)","DOI":"10.1109\/ARES.2011.11"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35130-3_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:09:53Z","timestamp":1620133793000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35130-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351297","9783642351303"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35130-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}