{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:55:14Z","timestamp":1743040514815,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":34,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_12","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"71-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Formally Specifying Linux Protection"],"prefix":"10.1007","author":[{"given":"Osama A.","family":"Rayis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"12_CR1","unstructured":"Akyildiz, I. And Benson G., 1989, \u201cSecurity Models of Distributed Systems\u201d. In Proceedings of the 4th International Symposium on Computer and Information Sciences, A. Dogacand E. Gelenbe, Eds.Turkey."},{"key":"12_CR2","series-title":"ESD-TR-278, 1 , ESD\/AFSC","volume-title":"Secure Computer Systems : Mathematical Foundations","author":"Bell","year":"1973","unstructured":"Bell and LaPadula, 1973, \u201cSecure Computer Systems : Mathematical Foundations\u201d. ESD-TR-278, 1 , ESD\/AFSC, Hanscom AFB, Bedford, Ma."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Bertino Elisa et al, 1996, \u201cA Temporal Access Control Mechanism for Database Systems\u201d, IEEE Transactions on Knowledge and Data Engineering Vol. 8, No. 1.","DOI":"10.1109\/69.485637"},{"key":"12_CR4","unstructured":"Bertino Elisa et al, 1996, \u201cSupporting Periodic Authorization and Temporal Reasoning in Database Access Control,\u201d Proceeding of the 22nd VLDB conference Mumbai, India."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bertino Elisa, P. Sammarati and S. Jajodia, 1997, \u201cAn Extended Authorization Model for Relational Databases.\u201d IEEE Transactions on Knowledge and Data Engineering.","DOI":"10.1109\/69.567051"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Bertino Elisa et al, 1997, \u201cA Flexible model for the Specification and Enforcement of Authorizations in Workflow Management Systems\u201d Technical Report, University of Milano.","DOI":"10.1145\/266741.266746"},{"key":"12_CR7","unstructured":"Boswell A., 1995, \u201cSpecification and Validation of a Security Policy Model,\u201d in IEEE Transactions on Software Engineering, Vol. 21, No.2Benson G., I. Akyildiz and W. Applebe, 1990, \u201cA Formal Protection Model of Security in Centralized, Parallel and Distributed Systems.\u201d ACM Transaction on Computer Systems."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Boyd Colin, 1993, \u201cSecurity Architectures Using Formal Methods,\u201d IEEE Journal On Selected Areas In Communications.","DOI":"10.1109\/49.223872"},{"key":"12_CR9","unstructured":"Charles P. Pfleeger, 1989, \u201cSecurity In Computing,\u201d Prentice Hall."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Denning D.E., 1976, \u201cA Lattice Model of Secure Information Flow\u201d. Communications of the ACM.","DOI":"10.1145\/360051.360056"},{"key":"12_CR11","unstructured":"Denning Dorothy, 1982, \u201cCryptography and Data Security,\u201d Addison-Wesley."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Glasgow J., G.MacEwen and P. Panangaden, 1992, \u201cA Logic for Reasoning About Security,\u201d ACM Transaction on Computer Systems.","DOI":"10.1145\/146937.146940"},{"key":"12_CR13","unstructured":"Goscinski A. G., 1991 \u201cDistributed Operating Systems The Logical Design,\u201d Adison-Wesly."},{"key":"12_CR14","unstructured":"Graham and Denning, 1972, \u201cProtection Principles and practices.\u201d Proceedings of the AFIPS Spring Joint Computer Conference."},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Harrison, Ruzzo and Ullman, 1976, \u201cProtection in operating system,\u201d Communications of the ACM.","DOI":"10.1145\/800213.806517"},{"key":"12_CR16","unstructured":"Johnson Michael & Troan Erik, 2005, \u201cLinux Application Development\u201d, 2nd edition, Pearson Education."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Kwon J., Chang-Joo Moon, 2007, \u201cVisual Modeling and Formal Specification of Constraints of RBAC Using Semantic Web Technology,\u201d Knowledge-Based System, Volume 20, Issue 4.","DOI":"10.1016\/j.knosys.2006.08.002"},{"key":"12_CR18","unstructured":"Lampson B. W., 1971, \u201cProtection\u201d. Fifth Princeton Conference on Information and Systems Sciences."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Landwehr C.E., 1981, \u201cFormal Models for Computer Security.\u201d ACM Computing Surveys 13(3).","DOI":"10.1145\/356850.356852"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Leiss Ernst, 1982, \u201cPrinciples of Data Security,\u201d Plenum Press.","DOI":"10.1007\/978-1-4684-4316-5"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Mclean John, 1990, \u201cThe Specification And Modeling Of Computer Security.\u201d IEEE Computer, Volume 23, Issue 1.","DOI":"10.1109\/2.48795"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Peleg M., Dizza Beimel, Dov Dori, Yaron Denekamp, 2008, \u201cSituation -Based Access Control: Privacy Management Via Modeling of Patient Data Access Scenarios\u201d Journal of Biomedical Informatics.","DOI":"10.1016\/j.jbi.2008.03.014"},{"key":"12_CR23","unstructured":"Potter B., Sinclair J. And Till D. 1996 \u201cAn Introduction to Formal Specification and Z,\u201d 2nd edition, Prentice Hall."},{"key":"12_CR24","unstructured":"Rayis Osama, 1996, \u201cSoftware Protection through dedicated Hardware. Ms Thesis Middle East Technical University."},{"key":"12_CR25","unstructured":"Rayis Osama, 1997, \u201cAn Adaptable Workflow Environment, Authorization Model Definition,\u201d Technical Report SRDC - Middle East Technical University."},{"issue":"9","key":"12_CR26","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"Sandhu Ravi","year":"1994","unstructured":"Sandhu Ravi and Pierangela Samarati, 1994, \u201cAccess Control: Principles and Practice\u201d. IEEE Communications, 32(9):40-48.","journal-title":"IEEE Communications"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Sandhu Ravi, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman, 1996 \u201cRole-Based Access Control Models,\u201d IEEE Computer, 29(2):38-47.","DOI":"10.1109\/2.485845"},{"key":"12_CR28","unstructured":"Snekkenes E., 1990, \u201cAuthentication in Open Systems\u201d, in Protocol Spec. Testing & Ver., Elsevier Science Publishers."},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Stallings B., 2007 \u201cRole-Based Access Control in Computer Security\u201d Prentice Hall.","DOI":"10.1145\/1229285.1229305"},{"key":"12_CR30","unstructured":"Stallings W., Brown L., 2007, \u201cComputer Security: Principles and Practice,\u201d Prentice Hall."},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Tomur E., Erten Y., 2006 \u201cApplication Of Temporal and Spatial Role Based Access Control In 802.11 Wireless Networks,\u201d Computers & Security, Vol. 25, Issue 6.","DOI":"10.1016\/j.cose.2006.05.007"},{"key":"12_CR32","unstructured":"Vijayalakshmi Atluri and Wei-Kuang Huang, 1996, \u201cAn Authorization Model for Workflows\u201d, Computer Security - ESORICS 96, Rome."},{"key":"12_CR33","unstructured":"Wordsworth J.B., 1992, \u201cSoftware Development with Z\u201d, Addison-Wesley."},{"key":"12_CR34","unstructured":"Torvalds L., 2008, \u201cThe Linux Kernel,\u201d http:\/\/www.kernel.org\/"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T22:35:45Z","timestamp":1675895745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_12","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}