{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:26:40Z","timestamp":1725733600356},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396489"},{"type":"electronic","value":"9783642396496"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39649-6_44","type":"book-chapter","created":{"date-parts":[[2013,6,21]],"date-time":"2013-06-21T05:09:21Z","timestamp":1371791361000},"page":"614-628","source":"Crossref","is-referenced-by-count":2,"title":["An Extensible and Decoupled Architectural Model for Authorization Frameworks"],"prefix":"10.1007","author":[{"given":"Jefferson O.","family":"Silva","sequence":"first","affiliation":[]},{"given":"Eduardo M.","family":"Guerra","sequence":"additional","affiliation":[]},{"given":"Clovis T.","family":"Fernandes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"44_CR1","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A Logical Framework for Reasoning about Access Control Models. ACM Transactions on Information and System Security\u00a06(1), 71\u2013127 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"44_CR2","unstructured":"Privilege Management Conference Collaboration Team: A report on the privilege (access) management workshop (NIST-IR-7657), Washington, DC (2010)"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D.F., Kuhn, D.R.: Assessment of Access Control (NIST-IR-7316), Gaithersburg, MD (2006)","DOI":"10.6028\/NIST.IR.7316"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Scarfone, K.: Guidelines for Access Control System Evaluation Metrics NIST-IR-7874, Gaithersburg, MD (2012)","DOI":"10.6028\/NIST.IR.7874"},{"key":"44_CR5","unstructured":"Guerra, E.M.: A Conceptual Model for Metadata-based Frameworks, S\u00e3o Jos\u00e9 dos Campos (2010)"},{"key":"44_CR6","first-page":"55","volume-title":"Building Application Frameworks: Object-oriented Foundations of Framework Design","author":"M. Fayad","year":"1999","unstructured":"Fayad, M., Schmidt, D.C., Johnson, R.E.: Building application frameworks: object-oriented foundations of framework design. In: Building Application Frameworks: Object-oriented Foundations of Framework Design, pp. 55\u201383. Wiley, New York (1999)"},{"key":"44_CR7","unstructured":"Ferraiolo, D., Kuhn, R., Chandramoulli, R.: Role-based access control. Artech House (2007)"},{"key":"44_CR8","unstructured":"Ferraiolo, D., Kuhn, R.: Role-based Access Controls. In: Proceedings of 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, pp. 554\u2013563 (1992)"},{"key":"44_CR9","unstructured":"Elliott, A.A., Knight, G.S.: Role Explosion: Acknowledging the Problem. In: Proceedings of the 2010 International Conference on Software Engineering Research & Practice (2010)"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D.F., Kuhn, D.R.: The NIST Model for Role-Based Access Control: Toward a Unified Standard. In: 5th ACM Workshop Role-Based Access Control, pp. 47\u201363 (2000)","DOI":"10.1145\/344287.344301"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Probst, S., Kung, J.: The need for declarative security mechanisms. In: Proceedings of 30th\u00a0Euromicro Conference, pp. 526\u2013531 (2004)","DOI":"10.1109\/EURMIC.2004.1333417"},{"issue":"2-3","key":"44_CR12","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.scico.2007.07.005","volume":"70","author":"M. Merz","year":"2008","unstructured":"Merz, M.: Enabling declarative security through the use of Java Data Objects. Journal of Science of Computer Programming\u00a070(2-3), 208\u2013220 (2008)","journal-title":"Journal of Science of Computer Programming"},{"key":"44_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-19125-1_16","volume-title":"Engineering Secure Software and Systems","author":"S. Bartsch","year":"2011","unstructured":"Bartsch, S.: Authorization Enforcement Usability Case Study. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol.\u00a06542, pp. 209\u2013220. Springer, Heidelberg (2011)"},{"key":"44_CR14","unstructured":"Hai-bo, S., Fan, H.: An Attribute-Based Access Control Model for Web Services. In: PDCAT 2006. Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 74\u201379 (2006)"},{"key":"44_CR15","unstructured":"Peng, J., Yang, F.: Description Logic Modeling of Temporal Attribute-Based Access Control. In: ICCE 2006, First International Conference on Communications and Electronics, pp. 414\u2013418 (2006)"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Hsieh, G., Foster, K., Emamali, G., Patrick, G., Marvel, L.: Using XACML for Embedded and Fine-Grained Access Control Policy. In: ARES 2009 International Conference, pp. 462\u2013468 (2009)","DOI":"10.1109\/ARES.2009.102"},{"key":"44_CR17","unstructured":"XACML: eXtensible Access Control Markup Language (XACML), Version 3.0, Committee Specification 01 (2011), http:\/\/docs.oasisopen.org\/xacml\/3.0\/xacml-3.0-core-spec-cs-01-en.pdf"},{"key":"44_CR18","unstructured":"Bo, L., Nan, Z., Kun, G., Kai, C.: An XACML Policy Generating Method Based on Policy View. In: ICPCA 2008: Third International Conference on Pervasive Computing and Applications, vol.\u00a01, pp. 295\u2013301 (2008)"},{"key":"44_CR19","unstructured":"CGLIB: Code Generation Library (2013), http:\/\/cglib.sourceforge.net"},{"key":"44_CR20","unstructured":"Java EE: Java Enterprise Edition Tutorial 6 (2013), http:\/\/docs.oracle.com\/javaee\/6\/tutorial\/doc\/bnbyl.html"},{"key":"44_CR21","unstructured":"Spring Framework: Spring Source Community (2013), http:\/\/www.springsource.org\/"},{"key":"44_CR22","unstructured":"Perillo, J., Guerra, E., Silva, J., Silveira, F., Fernandes, C.: Metadata Modularization Using Domain Annotations. In: Workshop on Assessment of Contemporary Modularization Techniques, Orlando, vol.\u00a03 (2009)"},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Perillo, J., Guerra, E., Fernandes, C.: Daileon-A Tool for Enabling Domain Annotations. In: RAM-SE 2009: Proceedings of the Workshop on AOP and Meta-Data for Software Evolution, vol.\u00a07 (2009)","DOI":"10.1145\/1562860.1562867"},{"key":"44_CR24","unstructured":"Sun\u2019s XACML: Sun\u2019s XACML Implementation (2013), http:\/\/sunxacml.sourceforge.net\/"},{"key":"44_CR25","unstructured":"Trusted Computer System Evaluation Criteria (Orange Book), Department of Defense (1985), http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf"},{"key":"44_CR26","unstructured":"Sayaf, R., Clarke, D.: Access Control Models for Online Social Networks. In: Social Network Engineering for Secure Web Data and Services (2012)"},{"key":"44_CR27","unstructured":"Sayaf, R.: Access control for online social networks - research summary. In: For Your Eyes Only Conference, Brussels (2012)"},{"key":"44_CR28","doi-asserted-by":"crossref","unstructured":"Ribeiro, M., Dosea, M., Bonif\u00e1cio, R., Neto, A.C., Borba, P., Soares, S.: Analyzing Class and Crosscutting Modularity Structure Matrixes. In: Proceedings of the 21th Brazilian Symposium on Software Engineering, SBES (2007)","DOI":"10.5753\/sbes.2007.21305"},{"key":"44_CR29","unstructured":"Neto, A.C., Ribeiro, M., D\u00f3sea, M., Bonif\u00e1cio, R., Borba, P., Soares, S.: Semantic Dependencies and Modularity of Aspect-Oriented Software. In: Workshop on Assessment of Contemporary Modularization Techniques (2007)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39649-6_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,2]],"date-time":"2023-07-02T14:07:57Z","timestamp":1688306877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39649-6_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396489","9783642396496"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39649-6_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}