{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T12:54:53Z","timestamp":1720961693272},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,17]],"date-time":"2013-05-17T00:00:00Z","timestamp":1368748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10660-013-9123-2","type":"journal-article","created":{"date-parts":[[2013,5,16]],"date-time":"2013-05-16T11:46:25Z","timestamp":1368704785000},"page":"273-289","source":"Crossref","is-referenced-by-count":2,"title":["The RBAC model and implementation architecture in multi-domain environment"],"prefix":"10.1007","volume":"13","author":[{"given":"Zan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jian-xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Rui-guang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bao-sheng","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Jie-kun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shu-mei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,17]]},"reference":[{"issue":"2","key":"9123_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10660-009-9027-3","volume":"9","author":"M. R. Cagnina","year":"2009","unstructured":"Cagnina, M. R., & Poian, M. (2009). Beyond e-business models: the road to virtual worlds. Electronic Commerce Research, 9(2), 49\u201375.","journal-title":"Electronic Commerce Research"},{"key":"9123_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-87742-4","volume-title":"Security for web services and service-oriented architectures","author":"E. Bertino","year":"2010","unstructured":"Bertino, E., Martino, L., Paci, F., & Squicciarini, A. (2010). Security for web services and service-oriented architectures (1st ed.). Berlin: Springer. http:\/\/download.csdn.net\/download\/yuan_ping_an\/4115257 . Accessed 23 Nov.\u00a02011","edition":"1"},{"key":"9123_CR3","doi-asserted-by":"crossref","unstructured":"Wang, X., Sang, Y., Liu, Y., & Luo, Y. (2011). Considerations on security and trust measurement for virtualized environment. Journal of Convergence","DOI":"10.1007\/978-94-007-2105-0_31"},{"key":"9123_CR4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/35.312842","volume":"9","author":"R. S. Sandhu","year":"1994","unstructured":"Sandhu, R. S., & Samarati, P. (1994). Access control: principles and practice. IEEE Communications Magazine, 9, 40\u201348.","journal-title":"IEEE Communications Magazine"},{"key":"9123_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-0-387-48533-1_1","volume-title":"Handbook of Database Security","author":"S. Vimercati","year":"2008","unstructured":"Vimercati, S., Foresti, S., & Samarati, P. (2008). Recent advances in access control. In Handbook of Database Security (pp. 1\u201326)."},{"issue":"2","key":"9123_CR6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. S. Sandhu","year":"1996","unstructured":"Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role based access control models. Computer, 29(2), 38\u201347.","journal-title":"Computer"},{"key":"9123_CR7","volume-title":"Proceedings of the fifth ACM workshop on role-based access control","author":"R. S. Sandhu","year":"2000","unstructured":"Sandhu, R. S., Ferraiolo, D., & Kuhn, R. (2000). The NIST model for role-based access control: towards a unified standard. In Proceedings of the fifth ACM workshop on role-based access control, New York."},{"issue":"1","key":"9123_CR8","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1023\/B:ELEC.0000009285.50078.b2","volume":"4","author":"W. Essmayr","year":"2004","unstructured":"Essmayr, W., Probst, S., & Weippl, E. (2004). Role-based access controls: status, dissemination, and prospects for generic security mechanisms. Electronic Commerce Research, 4(1), 127\u2013156.","journal-title":"Electronic Commerce Research"},{"issue":"10","key":"9123_CR9","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"D. Kuhn","year":"2010","unstructured":"Kuhn, D., Coyne, E., & Weil, T. (2010). Adding attributes to role-based access control. Computer, 43(10), 79\u201381.","journal-title":"Computer"},{"key":"9123_CR10","first-page":"114","volume-title":"SP\u201902 proceedings","author":"N. H. Li","year":"2002","unstructured":"Li, N. H., Mitchell, J., & Winsborough, W. (2002). Design of a role-based trust-management framework. In SP\u201902 proceedings, Washington (pp. 114\u2013130)."},{"key":"9123_CR11","unstructured":"Defense Information Systems Agency (2004). A security architecture for NET-CENTRIC Enterprise Services, Version 0.3. http:\/\/www.defense.gov\/ . Accessed\u00a030\u00a0Jun.\u00a02005."},{"issue":"3","key":"9123_CR12","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., & Bonatti, P. (2001). TRBAC: a temporal role-based access control model. ACM Transactions on Information and System Security, 4(3), 191\u2013223.","journal-title":"ACM Transactions on Information and System Security"},{"key":"9123_CR13","first-page":"36","volume-title":"WORDS\u201905 proceedings","author":"S. Piromruen","year":"2005","unstructured":"Piromruen, S., & Joshi, J. B. (2005). An RBAC framework for time constrained secure interoperation in multi-domain environment. In WORDS\u201905 proceedings (pp. 36\u201345)."},{"issue":"2","key":"9123_CR14","first-page":"303","volume":"44","author":"X. L. Shi","year":"2007","unstructured":"Shi, X. L., Fang, Y., Zhang, Y., Li, Y. L., & Sun, L. P. (2007). A role-based access control model in distributed environment. Journal of Sichuan University, 44(2), 303\u2013307.","journal-title":"Journal of Sichuan University"},{"key":"9123_CR15","first-page":"24","volume-title":"E-science \u201906 proceedings","author":"Y. Demchenko","year":"2006","unstructured":"Demchenko, Y., & Laat, C. (2006). Domain based access control model for distributed collaborative applications. In E-science \u201906 proceedings, Amsterdam (pp. 24\u201332)."},{"issue":"1","key":"9123_CR16","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1023\/B:ELEC.0000045975.59531.08","volume":"9","author":"A. Stubblefield","year":"2005","unstructured":"Stubblefield, A., Rubin, A. D., & Wallach, D. S. (2005). Managing the performance impact of web security. Electronic Commerce Research, 9(1), 99\u2013116.","journal-title":"Electronic Commerce Research"},{"issue":"3","key":"9123_CR17","first-page":"33","volume":"6","author":"L. Priggouris","year":"2006","unstructured":"Priggouris, L., & Hadjiefthymiades, S. (2006). A distributable security management architecture for enterprise systems spanning multiple security domains. Electronic Commerce Research, 6(3), 33\u201366.","journal-title":"Electronic Commerce Research"},{"key":"9123_CR18","unstructured":"Kapadia, A., Al-mohtadi, J., Campbell, R., & Mikunas, D. (2000). IRBAC 2000: secure interoperability using dynamic role translation (Technical Report UIUCDCS-R-2000-2162). Illinois University."},{"key":"9123_CR19","first-page":"59","volume-title":"ICWS 2005","author":"A. Chafi","year":"2005","unstructured":"Chafi, A., & Mezini, M. (2005). Using aspects for security engineering of web service compositions, web services. In ICWS 2005 (Vol.\u00a01, pp. 59\u201366)."},{"key":"9123_CR20","first-page":"275","volume-title":"ICWS 2006","author":"E. Bertino","year":"2006","unstructured":"Bertino, E., Crampton, J., & Paci, F. (2006). Access control and authorization constraints for WS-BPEL, web services. In ICWS 2006 (pp. 275\u2013284)."},{"key":"9123_CR21","first-page":"155","volume":"2","author":"M. Menzel","year":"2007","unstructured":"Menzel, M., Wolter, C., & Meinel, C. (2007). Access control for cross-organisational web service composition. Journal of Information Assurance and Security, 2, 155\u2013160.","journal-title":"Journal of Information Assurance and Security"},{"key":"9123_CR22","volume-title":"PST\u201906 proceedings","author":"A. Kamath","year":"2006","unstructured":"Kamath, A., Liscano, R., & Saddik, A. E. (2006). User-credential based role mapping in multi-domain environment. In PST\u201906 proceedings (Vol. 62)."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9123-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9123-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9123-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T05:30:30Z","timestamp":1645075830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9123-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,17]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["9123"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9123-2","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,17]]}}}