{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T10:58:49Z","timestamp":1648810729978},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commerce Res"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1007\/s10660-006-8679-5","type":"journal-article","created":{"date-parts":[[2006,9,27]],"date-time":"2006-09-27T22:29:49Z","timestamp":1159396189000},"page":"355-388","source":"Crossref","is-referenced-by-count":0,"title":["A distributable security management architecture for enterprise systems spanning multiple security domains"],"prefix":"10.1007","volume":"6","author":[{"given":"Ioannis","family":"Priggouris","sequence":"first","affiliation":[]},{"given":"Stathes","family":"Hadjiefthymiades","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8679_CR1","doi-asserted-by":"crossref","unstructured":"Barford, P., & Crovella, M. (1998). Generating representative web workloads for network and server performance evaluation. In proceedings of ACM SIGMETRICS.","DOI":"10.1145\/277858.277897"},{"key":"8679_CR2","doi-asserted-by":"crossref","unstructured":"Barka, E., & Sandhu, R. (2004). Role-based delegation model\/ hierarchical roles (RBDM1). In proceedings of 20th Annual Computer Security Applications Conference (ACSAC\u201904), (pp. 396\u2013404), Tuscon, Arizona.","DOI":"10.1109\/CSAC.2004.31"},{"key":"8679_CR3","unstructured":"Barkley, J. (1995). Implementing role based access control using object technology. In proceedings of 1st ACM Workshop on Role-Based Access Control. Gaithersburg, Maryland, November 30-December 1."},{"key":"8679_CR4","doi-asserted-by":"crossref","unstructured":"Catledge, L., & Pitkow, J. (1995). Characterizing browsing strategies in the world-wide web. In Proceedings of the Third International WWW Conference. Darmstadt, Germany.","DOI":"10.1016\/0169-7552(95)00043-7"},{"key":"8679_CR5","unstructured":"Cattell, R. et al. (2000). Java 2 platform, enterprise edition : Platform and component specifications. Addison-Wesley."},{"key":"8679_CR6","unstructured":"Chandramouli, R., & Sandhu, R.(1998). Role based access control features in commercial database management systems. 21st National Information Systems Security Conference. Crystal City, Virginia."},{"key":"8679_CR7","doi-asserted-by":"crossref","unstructured":"Crocker, D.H. (1982). Standard for the format of ARPA internet text messages STD11, RFC 822, UDEL.","DOI":"10.17487\/rfc0822"},{"key":"8679_CR8","unstructured":"Duckett, J. et al. (2001). Professional XML schemas. 1st edition, Wrox Press Inc."},{"key":"8679_CR9","unstructured":"Enterprise Java Beans Specification version 2.1, Final Release, Sun Microsystems, November (2003)."},{"key":"8679_CR10","unstructured":"Ferraiolo, D., & Kuhn, D.R. (1992). Role based access control. In proceedings of the 15th Annual Conference on National Computer Security. National Institute of Standards and Technology (pp. 554\u2013563). Gaithersburg, MD."},{"key":"8679_CR11","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R. & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4.","DOI":"10.1145\/501978.501980"},{"key":"8679_CR12","unstructured":"Guiri, L. (1995). A new model for role-based access control. In proceedings of the 11th Annual Conference on Computer Security Applications. New Orleans, LA."},{"key":"8679_CR13","doi-asserted-by":"crossref","unstructured":"Guiri, L., & Iglio, P.A. (1996). Formal model for role-based access control with constraints. In proceedings of 9th IEEE Workshop on Computer Security Foundations, Kenmare, Ireland.","DOI":"10.1109\/CSFW.1996.503698"},{"key":"8679_CR14","doi-asserted-by":"crossref","unstructured":"Hodges, J., & Morgan, R. (2002). Lightweight directory access protocol (v3): Technical specification. IETF Network WG, RFC, 3377.","DOI":"10.17487\/rfc3377"},{"key":"8679_CR15","unstructured":"Horstmann, C., & Cornell, G. (2004). Core Java 2: Volume1-fundamentals. Prentice-Hall."},{"key":"8679_CR16","unstructured":"Howes, T., Smith, M., & Good, G. (1999). Understanding and deploying LDAP directory services. Macmillan Publishing Co., Inc., Indianapolis, IN."},{"key":"8679_CR17","unstructured":"Kalakota, R., & Whinston, A.B. (1999). Electronic commerce. Addison-Wesley."},{"issue":"6","key":"8679_CR18","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MIC.2003.1250588","volume":"7","author":"D.A. Menasc\u00e9","year":"2003","unstructured":"Menasc\u00e9, D.A. (2003). Web server software architectures. IEEE internet computing, 7(6), 78\u201381.","journal-title":"IEEE internet computing"},{"key":"8679_CR19","doi-asserted-by":"crossref","unstructured":"Osborn, S., Sahdhu, R.S., & Mutanawer, Q. (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions On Information and System Security, 3.","DOI":"10.1145\/354876.354878"},{"key":"8679_CR20","unstructured":"Park, J., Ahn, G-J., & Sandhu, R. (2002). Role-based Access Control on the Web Using LDAP, database security XV: Status and prospects. Kluwer."},{"key":"8679_CR21","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R., & Ahn, G.-J. (2001). Role-based access control on the web. ACM Transactions on Information and System Security (TISSEC), 4.","DOI":"10.1145\/383775.383777"},{"key":"8679_CR22","unstructured":"Roman, Ed et al. (2002). Mastering enterprise javabeans. 2nd edition, Wiley Computer Publishing."},{"key":"8679_CR23","unstructured":"Sandhu, R. (1995). Rationale for the RBAC96 family of access control models. In proceedings of the 1st ACM Workshop on Role-Based Access Control. Gaithersburg, Maryland."},{"issue":"1","key":"8679_CR24","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R. Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati V., & Munawer Q. (1999).The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security (TISSEC). Special issue on role-based access control, 2(1), 105\u2013135.","journal-title":"ACM Transactions on Information and System Security (TISSEC). Special issue on role-based access control"},{"issue":"2","key":"8679_CR25","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., & Youman, C.E. (1996). Role-based access control models. IEEE computer, 29(2), 38\u201347.","journal-title":"IEEE computer"},{"key":"8679_CR26","unstructured":"Stark, S. et al. (2002). Jboss administration and development 2nd edition. Jboss Group LLC, Atlanta."},{"key":"8679_CR27","unstructured":"Thomas, T.M. (2001). Java data access: JDBC, JNDI, and JAXP, 1st edition. John Wiley & Sons."},{"key":"8679_CR28","unstructured":"Viniotis, Y. (1998). Probability and random processes for electrical engineers, McGraw-Hill."},{"key":"8679_CR29","doi-asserted-by":"crossref","unstructured":"Wahl, M., Howes, T., & Kille, S. (1997). Lightweight directory access protocol (v3). IETF Network WG, RFC 2251.","DOI":"10.17487\/rfc2251"},{"key":"8679_CR30","doi-asserted-by":"crossref","unstructured":"Yao, W., Moody, K., & Bacon, J. (2001). A model of OASIS role-based access control and its support for active security. In Proceeding of SACMAT 2001, Virginia, USA.","DOI":"10.1145\/373256.373294"},{"key":"8679_CR31","unstructured":"Zhang, X.W., Park, J., & Sandhu, R. (2003). Schema based XML security: RBAC approach. Technical Report, IFIP WG, 11.3."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-8679-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-006-8679-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-006-8679-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T16:49:52Z","timestamp":1559234992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-006-8679-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":31,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["8679"],"URL":"https:\/\/doi.org\/10.1007\/s10660-006-8679-5","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}