{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:13:05Z","timestamp":1725707585222},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642355998"},{"type":"electronic","value":"9783642356001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35600-1_40","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T07:31:37Z","timestamp":1353915097000},"page":"263-270","source":"Crossref","is-referenced-by-count":0,"title":["A Study of Policy Framework in Distributed Environment"],"prefix":"10.1007","author":[{"given":"SungWook","family":"Ahn","sequence":"first","affiliation":[]},{"given":"SungYul","family":"Rhew","sequence":"additional","affiliation":[]},{"given":"KwanHo","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Huang, H., Meissner, A., et al.: QoS Policy Framework and its Implementation. IEEE (2000)"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Moore, B., Ellesson, E., Westernen, A.: Policy Core Information Model \u2013 Version 1 Specification, IETF (2001), \n                  \n                    http:\/\/www.ietf.org\/rfc\/rfc3060.txt","DOI":"10.17487\/rfc3060"},{"key":"40_CR3","unstructured":"Lobo, J., Bhatia, R., Naqvi, S.: A Policy Description Language. AAAI (1999)"},{"key":"40_CR4","unstructured":"Hoagland, J.A.: Specifiying and Implementing Security Policies Using LaSCO, the Language for Security Constraints on Objects. IEEE (2000)"},{"key":"40_CR5","unstructured":"Hoagland, J.A., Pandey, R., Levitt, K.N.: A Logical Language for Expressing Authorizations. IEEE (1997)"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Sloman, M., Lupu, E.: Security and Management Policy Specification. IEEE (2002)","DOI":"10.1109\/65.993218"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer (1996)","DOI":"10.1109\/2.485845"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Stone, G.N., Lundy, B., Xie, G.G.: Network Policy Language: A Survey and a New Approach. IEEE Network (2001)","DOI":"10.21236\/ADA381775"},{"key":"40_CR9","unstructured":"Ahn, S.W., Rhew, S.Y.: Policy Information in Mobile Environment. In: APIS (2009)"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Ahn, S.W., Rhew, S.Y.: Policy Definition Language for Service Management in Mobile Environment. In: KIPS (2009)","DOI":"10.3745\/KIPSTD.2009.16-D.4.561"},{"key":"40_CR11","unstructured":"The Parlay Group, Comparing OMA OSE and Parlay Architectures, OMA (2005)"}],"container-title":["Communications in Computer and Information Science","Computer Applications for Graphics, Grid Computing, and Industrial Environment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35600-1_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T02:22:07Z","timestamp":1557368527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35600-1_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642355998","9783642356001"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35600-1_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}