{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341872,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_28","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"310-321","source":"Crossref","is-referenced-by-count":1,"title":["A Theoretical Study on Access Control Model in Federated Systems"],"prefix":"10.1007","author":[{"given":"Anant V.","family":"Nimkar","sequence":"first","affiliation":[]},{"given":"Soumya K.","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-20895-9_34","volume-title":"Logic Programming and Nonmonotonic Reasoning","author":"S. Barker","year":"2011","unstructured":"Barker, S., Genovese, V.: Secommunity: A framework for distributed access control. In: Delgrande, J.P., Faber, W. (eds.) LPNMR 2011. LNCS, vol.\u00a06645, pp. 297\u2013303. Springer, Heidelberg (2011)"},{"key":"28_CR2","volume-title":"Secure computer systems: Mathematical foundations. Technical Report MTR-2547","author":"D. Bell","year":"1973","unstructured":"Bell, D., LaPadula, L.: Secure computer systems: Mathematical foundations. Technical Report MTR-2547, vol.\u00a0I. MITRE Corporation, Bedford (1973)"},{"key":"28_CR3","unstructured":"Biba, J.K.: Integrity considerations for secure computer systems. MITRE Co., technical report ESD-TR 76-372, pp. 1\u201368 (April 1977)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The chinese wall security policy. In: IEEE Symposium on Security and Privacy, pp. 206\u2013214 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-13119-6_2","volume-title":"Algorithms and Architectures for Parallel Processing","author":"R. Buyya","year":"2010","unstructured":"Buyya, R., Ranjan, R., Calheiros, R.N.: Intercloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010, Part I. LNCS, vol.\u00a06081, pp. 13\u201331. Springer, Heidelberg (2010)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Decat, M., Lagaisse, B., Joosen, W.: Toward efficient and confidentiality-aware federation of access control policies. In: Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, MW4NG 2012, pp. 4:1\u20134:6. ACM, NY (2012)","DOI":"10.1145\/2405178.2405182"},{"issue":"5","key":"28_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Dong, G., Cui, G., Shi, W., Miao, Y.: Community health records and hospital medical record file sharing system model. In: 2011 IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), pp. 146\u2013148 (2011)","DOI":"10.1109\/ICSESS.2011.5982275"},{"key":"28_CR9","unstructured":"Ferraiolo, D., Kuhn, D.: Role-based access control. In: 15th National Computer Security Conference, pp. 554\u2013563 (October 1992)"},{"key":"28_CR10","first-page":"53","volume-title":"Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009","author":"V. Rao","year":"2009","unstructured":"Rao, V., Jaeger, T.: Dynamic mandatory access control for multiple stakeholders. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, pp. 53\u201362. ACM, New York (2009)"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/11506157_26","volume-title":"Information Security and Privacy","author":"S. Wang","year":"2005","unstructured":"Wang, S., Zhang, Y.: A formalization of distributed authorization with delegation. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 303\u2013315. Springer, Heidelberg (2005)"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Wenchao, Z., Yafen, L.: Federation access control model based on web-service. In: 2010 International Conference on E-Business and E-Government (ICEE), pp. 38\u201341 (2010)","DOI":"10.1109\/ICEE.2010.17"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp. 268\u2013275 (2010)","DOI":"10.1109\/CLOUD.2010.62"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:48Z","timestamp":1746130668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}