{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:10:08Z","timestamp":1745964608647,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642367410"},{"type":"electronic","value":"9783642367427"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36742-7_30","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T19:41:56Z","timestamp":1361216516000},"page":"432-447","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Policy Analysis for Self-administrated Role-Based Access Control"],"prefix":"10.1007","author":[{"given":"Anna Lisa","family":"Ferrara","sequence":"first","affiliation":[]},{"given":"P.","family":"Madhusudan","sequence":"additional","affiliation":[]},{"given":"Gennaro","family":"Parlato","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Role-based_access_control"},{"key":"30_CR2","unstructured":"http:\/\/www.microsoft.com\/sqlserver\/en\/us\/default.aspx"},{"key":"30_CR3","unstructured":"http:\/\/www.microsoft.com\/it-it\/server-cloud\/windows-server\/active-directory.aspx"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Ferrara, A.L., Madhusudan, P., Parlato, G.: Security analysis of access control policies through program verification. In: CSF, pp. 113\u2013125. IEEE (2012)","DOI":"10.1109\/CSF.2012.28"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Crampton, J.: Understanding and developing role-based administrative models. In: CCS, pp. 158\u2013167. ACM (2005)","DOI":"10.1145\/1102120.1102143"},{"key":"30_CR6","unstructured":"Ferraiolo, D., Kuhn, R.: Role-based access control. In: NCSC, pp. 554\u2013563 (1992)"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-00768-2_4","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M.I. Gofman","year":"2009","unstructured":"Gofman, M.I., Luo, R., Solomon, A.C., Zhang, Y., Yang, P., Stoller, S.D.: RBAC-PAT: A Policy Analysis Tool for Role Based Access Control. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol.\u00a05505, pp. 46\u201349. Springer, Heidelberg (2009)"},{"key":"30_CR8","unstructured":"Jayaraman, K., Ganesh, V., Tripunitara, M., Rinard, M.C., Chapin, S.J.: Arbac policy for a large multi-national bank (2010), http:\/\/kjayaram.mysite.syr.edu\/mohawk\/casestudy.pdf"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Jayaraman, K., Ganesh, V., Tripunitara, M.V., Rinard, M.C., Chapin, S.J.: Automatic error finding in access-control policies. In: CCS, pp. 163\u2013174. ACM (2011)","DOI":"10.1145\/2046707.2046727"},{"issue":"4","key":"30_CR10","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/TDSC.2007.70225","volume":"5","author":"S. Jha","year":"2008","unstructured":"Jha, S., Li, N., Tripunitara, M.V., Wang, Q., Winsborough, W.H.: Towards formal verification of role-based access control policies. IEEE Trans. Dependable Sec. Comput.\u00a05(4), 242\u2013255 (2008)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Kern, A.: Advanced features for enterprise-wide role-based access control. In: ACSAC, pp. 333\u2013342. IEEE (2002)","DOI":"10.1109\/CSAC.2002.1176305"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"La Torre, S., Madhusudan, P., Parlato, G.: Analyzing recursive programs using a fixed-point calculus. In: PLDI, pp. 211\u2013222. ACM (2009)","DOI":"10.1145\/1543135.1542500"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Mao, Z.: Administration in role-based access control. In: ASIACCS, pp. 127\u2013138. ACM (2007)","DOI":"10.1145\/1229285.1229305"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Li, N., Tripunitara, M.V.: Security analysis in role-based access control. In: SACMAT, pp. 126\u2013135. ACM (2004)","DOI":"10.1145\/990036.990058"},{"key":"30_CR15","unstructured":"O\u2019Connor, A.C., Loomis, R.J.: http:\/\/csrc.nist.gov\/groups\/SNS\/rbac\/documents\/20101219_RBAC2_Final_Report.pdf"},{"issue":"1","key":"30_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R.S. Sandhu","year":"1999","unstructured":"Sandhu, R.S., Bhamidipati, V., Munawer, Q.: The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur.\u00a02(1), 105\u2013135 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"30_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Munawer, Q.: The arbac99 model for administration of roles. In: ACSAC, pp. 229\u2013238. IEEE (1999)","DOI":"10.1109\/CSAC.1999.816032"},{"key":"30_CR19","unstructured":"Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy analysis for administrative role based access control. Tech. Rep., Stony Brook Univ. (2006)"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy analysis for administrative role based access control. In: CSFW, pp. 124\u2013138. IEEE (2006)","DOI":"10.1109\/CSFW.2006.22"},{"issue":"2-3","key":"30_CR21","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2010.08.002","volume":"30","author":"S.D. Stoller","year":"2011","unstructured":"Stoller, S.D., Yang, P., Gofman, M.I., Ramakrishnan, C.R.: Symbolic reachability analysis for parameterized administrative role-based access control. Computers & Security\u00a030(2-3), 148\u2013164 (2011)","journal-title":"Computers & Security"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Stoller, S.D., Yang, P., Ramakrishnan, C.R., Gofman, M.I.: Efficient policy analysis for administrative role based access control. In: CCS, pp. 445\u2013455. ACM (2007)","DOI":"10.1145\/1315245.1315300"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36742-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T21:32:53Z","timestamp":1745962373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36742-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642367410","9783642367427"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36742-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}