{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T21:39:27Z","timestamp":1775165967527,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564034"],"award-info":[{"award-number":["CNS-1564034"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1624503 and CNS-1747728"],"award-info":[{"award-number":["CNS-1624503 and CNS-1747728"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"crossref","award":["R01GM118574 and R35GM134927"],"award-info":[{"award-number":["R01GM118574 and R35GM134927"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Fulbright-Nehru Academic & Professional Excellence Fellowship"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s10796-021-10167-z","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T14:02:47Z","timestamp":1626876167000},"page":"2255-2272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6251-8097","authenticated-orcid":false,"given":"Mahendra Pratap","family":"Singh","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,21]]},"reference":[{"key":"10167_CR1","first-page":"177","volume":"IV","author":"S Aich","year":"2009","unstructured":"Aich, S., Mondal, S., Sural, S., & Majumdar, A.K. (2009). ESTARBAC: Role based access control with spatiotemporal context for mobile applications. Transactions on Computational Science, IV, 177\u2013199.","journal-title":"Transactions on Computational Science"},{"key":"10167_CR2","doi-asserted-by":"crossref","unstructured":"Alberti, F., Armando, A., & Ranise, S. (2011a). ASASP: automated symbolic analysis of security policies. In Proceedings of the 23rd international conference on automated deduction (pp. 26\u201333).","DOI":"10.1007\/978-3-642-22438-6_4"},{"key":"10167_CR3","doi-asserted-by":"crossref","unstructured":"Alberti, F., Armando, A., & Ranise, S. (2011b). Efficient symbolic automated analysis of administrative attribute-based RBAC policies. In Proceedings of the 6th ACM symposium on information, computer and communications security (pp. 165\u2013175).","DOI":"10.1145\/1966913.1966935"},{"key":"10167_CR4","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s10796-018-9887-y","volume":"22","author":"D Anagnostopoulos","year":"2020","unstructured":"Anagnostopoulos, D., Papadopoulos, T., Stamati, T., & Balta, M.E. (2020). Policy and information systems implementation: the greek property tax information system case. Information Systems Frontiers, 22, 791\u2013802.","journal-title":"Information Systems Frontiers"},{"key":"10167_CR5","doi-asserted-by":"crossref","unstructured":"Behrmann, G., David, A., & Larsen, K.G. (2004). A tutorial on UPPAAL. In Proceedings of the formal methods for the design of real-time systems (pp. 200\u2013236).","DOI":"10.1007\/978-3-540-30080-9_7"},{"issue":"3","key":"10167_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., & Ferrari, E. (2001). TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security, 4(3), 191\u2013233.","journal-title":"ACM Transactions on Information and System Security"},{"key":"10167_CR7","doi-asserted-by":"crossref","unstructured":"Bhatt, S., Patwa, F., & Sandhu, R.S. (2016). An attribute-based access control extension for openstack and its enforcement utilizing the policy machine. In 2nd IEEE international conference on collaboration and internet computing (pp. 37\u201345).","DOI":"10.1109\/CIC.2016.019"},{"key":"10167_CR8","doi-asserted-by":"crossref","unstructured":"Biswas, P., Sandhu, R.S., & Krishnan, R. (2016). Uni-arbac: A unified administrative model for role-based access control. In Proceedings of the 19th international conference on information security (pp. 218\u2013230).","DOI":"10.1007\/978-3-319-45871-7_14"},{"key":"10167_CR9","doi-asserted-by":"crossref","unstructured":"de Moura, L., & Bj\u00f8rner, N. (2008). Z3: an efficient SMT solver. In Proceedings of the 14th conference on tools and algorithms for the construction and analysis of systems (pp. 337\u2013340).","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"10167_CR10","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez, M., Mackie, I., & Thuraisingham, B. (2019). Specification and analysis of abac policies via the category-based metamodel. In Proceedings of the Ninth ACM conference on data and application security and privacy (pp. 173\u2013184).","DOI":"10.1145\/3292006.3300033"},{"key":"10167_CR11","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., & Atluri, V. (2008). A meta model for access control: Why is it needed and is it even possible to achieve?. In Proceedings of the 13th ACM symposium on access control models and technologies (pp. 153\u2013154).","DOI":"10.1145\/1377836.1377860"},{"key":"10167_CR12","doi-asserted-by":"crossref","unstructured":"Ferrara, A.L., Madhusudan, P., & Parlato, G. (2012). Security analysis of role-based access control through program verification. In Proceedings of the IEEE 25th computer security foundations symposium (pp. 113\u2013125).","DOI":"10.1109\/CSF.2012.28"},{"key":"10167_CR13","doi-asserted-by":"crossref","unstructured":"Ferrara, A.L., Madhusudan, P., & Parlato, G. (2013). Policy analysis for self-administrated role-based access control. In Proceedings of the 19th international conference on tools and algorithms for the construction and analysis of systems (pp. 432\u2013447).","DOI":"10.1007\/978-3-642-36742-7_30"},{"key":"10167_CR14","doi-asserted-by":"crossref","unstructured":"Ferrara, A.L., Madhusudan, P., Nguyen, T.L., & Parlato, G. (2014). VAC- verifier of administrative role-based access control policies. In Proceedings of the international conference on computer aided verification (pp. 184\u2013191).","DOI":"10.1007\/978-3-319-08867-9_12"},{"key":"10167_CR15","doi-asserted-by":"crossref","unstructured":"Geepalla, E., Bordbar, B., & Last, J. (2012). Transformation of spatio-temporal role based access control specification to alloy. In Proceedings of the 2nd international conference on model and data engineering (pp. 67\u201378).","DOI":"10.1007\/978-3-642-33609-6_8"},{"key":"10167_CR16","doi-asserted-by":"crossref","unstructured":"Gofman, M.I., Luo, R., Solomon, A.C., Zhang, Y., Yang, P., & Stoller, S.D. (2009). RBAC-PAT: a policy analysis tool for role based access control. In Proceedings of the international conference on tools and algorithms for the construction and analysis of systems (pp. 46\u201349).","DOI":"10.1007\/978-3-642-00768-2_4"},{"key":"10167_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, M., & Sandhu, R. (2016). The GURAG administrative model for user and group attribute assignment. In Proceedings of the 10th international conference on network and system security (pp. 318\u2013332).","DOI":"10.1007\/978-3-319-46298-1_21"},{"key":"10167_CR18","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Schnitzer, A., Sandlin, K., Miller, R., & Scarfone, K. (2013). Guide to Attribute Based Access Control (ABAC) Definition and Considerations (Draft). https:\/\/csrc.nist.gov\/csrc\/media\/publications\/sp\/800-162\/final\/documents\/sp800_16-2_draft.pdf.","DOI":"10.6028\/NIST.SP.800-162"},{"key":"10167_CR19","doi-asserted-by":"crossref","unstructured":"Hwang, J., Xie, T., Hu, V., & Altunay, M. (2010). ACPT: a tool for modeling and verifying access control policies. In Proceedings of the IEEE international symposium on policies for distributed systems and networks (pp. 40\u201343).","DOI":"10.1109\/POLICY.2010.22"},{"issue":"2","key":"10167_CR20","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/505145.505149","volume":"11","author":"D Jackson","year":"2002","unstructured":"Jackson, D. (2002). Alloy: a lightweight object modelling notation. ACM Transaction Software Engineering and Methodology, 11(2), 256\u2013290.","journal-title":"ACM Transaction Software Engineering and Methodology"},{"key":"10167_CR21","doi-asserted-by":"crossref","unstructured":"Jayaraman, K., Ganesh, V., Tripunitara, M., Rinard, M., & Chapin, S. (2011). Automatic error finding in access-control policies. In Proceedings of the 18th ACM conference on computer and communications security (pp. 163\u2013174).","DOI":"10.1145\/2046707.2046727"},{"issue":"4","key":"10167_CR22","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/TDSC.2007.70225","volume":"5","author":"S Jha","year":"2008","unstructured":"Jha, S., Li, N., Tripunitara, M., Wang, Q., & Winsborough, W. (2008). Towards formal verification of role-based access control policies. IEEE Transactions on Dependable and Secure Computing, 5(4), 242\u2013255.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10167_CR23","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.cose.2014.08.001","volume":"46","author":"S Jha","year":"2014","unstructured":"Jha, S., Sural, S., Vaidya, J., & Atluri, V. (2014a). Security analysis of temporal RBAC under an administrative model. Computers & Security, 46, 154\u2013172.","journal-title":"Computers & Security"},{"key":"10167_CR24","doi-asserted-by":"crossref","unstructured":"Jha, S., Sural, S., Vaidya, J., & Atluri, V. (2014b). Temporal RBAC security analysis using logic programming in the presence of administrative policies. In Proceedings of the international conference on information systems security (pp. 129\u2013148).","DOI":"10.1007\/978-3-319-13841-1_8"},{"key":"10167_CR25","doi-asserted-by":"crossref","unstructured":"Jha, S., Sural, S., Atluri, V., & Vaidya, J. (2016). An administrative model for collaborative management of ABAC systems and its security analysis. In Proceedings of the IEEE 2nd international conference on collaboration and internet computing (pp. 64\u2013 73).","DOI":"10.1109\/CIC.2016.022"},{"issue":"2","key":"10167_CR26","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1049\/iet-ifs.2018.5010","volume":"13","author":"S Jha","year":"2018","unstructured":"Jha, S., Sural, S., Atluri, V., & Vaidya, J. (2018). Security analysis of ABAC under an administattive model. IET Information Security, 13(2), 96\u2013103.","journal-title":"IET Information Security"},{"key":"10167_CR27","doi-asserted-by":"crossref","unstructured":"Jin, X., Krishnan, R., & Sandhu, R. (2012). A role-based administration for attributes. In Proceedings of the first international workshop on secure and resilient architectures and systems (pp. 7\u201312).","DOI":"10.1145\/2420936.2420938"},{"key":"10167_CR28","doi-asserted-by":"crossref","unstructured":"Jin, X., Krishnan, R., & Ravi, S. (2013). Reachability analysis for role based administration of attributes. In Proceedings of the 2013 ACM workshop on digital identity management (pp. 73\u201384).","DOI":"10.1145\/2517881.2517891"},{"key":"10167_CR29","doi-asserted-by":"crossref","unstructured":"Joshi, J.B.D., Bertino, E., Latif, U., & Ghafoor, A. (2005). Generalized temporal role based access control model (GTRBAC). IEEE Transactions on Knowledge and Data Engineering 4\u201323.","DOI":"10.1109\/TKDE.2005.1"},{"key":"10167_CR30","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1007\/s10796-019-09927-9","volume":"22","author":"HJ Kam","year":"2020","unstructured":"Kam, H.J., Mattson, T., & Goel, S. (2020). A cross industry study of institutional pressures on organizational effort to raise information security awareness. Information Systems Frontiers, 22, 1241\u20131264.","journal-title":"Information Systems Frontiers"},{"key":"10167_CR31","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s10796-018-9855-6","volume":"22","author":"M Kang","year":"2020","unstructured":"Kang, M., & Hovav, A. (2020). Benchmarking methodology for information security policy (bmisp): Artifact development and evaluation. Information Systems Frontiers, 22, 221\u2013242.","journal-title":"Information Systems Frontiers"},{"key":"10167_CR32","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10796-018-9870-7","volume":"22","author":"H Karimikia","year":"2020","unstructured":"Karimikia, H., Safari, N., & Singh, H. (2020). Being useful: How information systems professionals influence the use of information systems in enterprises. Information Systems Frontiers, 22, 429\u2013453.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10167_CR33","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"N Li","year":"2006","unstructured":"Li, N., & Tripunitara, M.V. (2006). Security analysis in role-based access control. ACM Transactions on Information and System Security, 9(4), 391\u2013420.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2\u20133","key":"10167_CR34","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.cose.2010.09.002","volume":"30","author":"S Mondal","year":"2011","unstructured":"Mondal, S., Sural, S., & Atluri, V. (2011). Security analysis of GTRBAC and its variants using model checking. Computers & Security, 30(2\u20133), 128\u2013147.","journal-title":"Computers & Security"},{"key":"10167_CR35","doi-asserted-by":"crossref","unstructured":"Ninglekhu, J., & Krishnan, R. (2017a). AARBAC: attribute-based administration of role-based access control. In Proceedings of the 3rd IEEE international conference on collaboration and internet computing (pp. 126\u2013135).","DOI":"10.1109\/CIC.2017.00027"},{"key":"10167_CR36","doi-asserted-by":"crossref","unstructured":"Ninglekhu, J., & Krishnan, R. (2017b). Attribute based administration of role based access control : a detail description. arXiv:1706.03171.","DOI":"10.1109\/CIC.2017.00027"},{"key":"10167_CR37","unstructured":"Ninglekhu, J., & Krishnan, R. (2017c). A model for attribute based role-role assignment (ARRA). arXiv:1706.10274."},{"key":"10167_CR38","doi-asserted-by":"crossref","unstructured":"Rajkumar, P.V., & Sandhu, R.S. (2016). POSTER: security enhanced administrative role based access control models. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 1802\u20131804).","DOI":"10.1145\/2976749.2989068"},{"key":"10167_CR39","doi-asserted-by":"crossref","unstructured":"Rajpoot, Q.M., Jensen, C.D., & Krishnan, R. (2015). Attributes enhanced role-based access control model. In Proceedings of the 12th international conference on trust, privacy and security in digital business (pp. 3\u201317).","DOI":"10.1007\/978-3-319-22906-5_1"},{"issue":"1","key":"10167_CR40","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., & Munawer, Q. (1999). The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 2(1), 105\u2013135.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"10167_CR41","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., & Youman, C.E. (1996). Role-based access control models. IEEE Computer, 29(2), 38\u201347.","journal-title":"IEEE Computer"},{"issue":"44","key":"10167_CR42","doi-asserted-by":"publisher","first-page":"6208","DOI":"10.1016\/j.tcs.2011.05.009","volume":"412","author":"A Sasturkar","year":"2011","unstructured":"Sasturkar, A., Yang, P., Stoller, S.D., & Ramakrishnan, C. (2011). Policy analysis for administrative role-based access control. Theoretical Computer Science, 412(44), 6208\u20136234.","journal-title":"Theoretical Computer Science"},{"key":"10167_CR43","doi-asserted-by":"crossref","unstructured":"Schaad, A., & Moffett, J.D. (2002). A lightweight approach to specification and analysis of role-based access control extensions. In Proceedings of the 7th symposium on access control models and technologies (pp. 13\u201322).","DOI":"10.1145\/507711.507714"},{"key":"10167_CR44","doi-asserted-by":"crossref","unstructured":"Shafiq, B., Masood, A., Joshi, J., & Ghafoor, A. (2005). A role-based access control policy verification framework for real-time systems. In Proceedings of the 10th IEEE international workshop on object-oriented real-time dependable systems (pp. 13\u201320).","DOI":"10.1109\/WORDS.2005.11"},{"key":"10167_CR45","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.cose.2013.07.005","volume":"39","author":"M Sharma","year":"2013","unstructured":"Sharma, M., Sural, S., Atluri, V., & Vaidya, J. (2013a). AMTRAC: An administrative model for temporal role-based access control. Computer & Security, 39, 201\u2013218.","journal-title":"Computer & Security"},{"key":"10167_CR46","doi-asserted-by":"crossref","unstructured":"Sharma, M., Sural, S., Atluri, V., & Vaidya, J. (2013b). An administrative model for spatio-temporal role based access control. In Proceedings of the 9th international conference on information and system security (pp. 375\u2013389).","DOI":"10.1007\/978-3-642-45204-8_28"},{"key":"10167_CR47","doi-asserted-by":"crossref","unstructured":"Singh, M.P., Sural, S., Atluri, V., Vaidya, J., & Yakub, U. (2015). Managing multi-dimensional multi-granular security policies using data warehousing. In Proceedings of the 9th international conference on network and system security (pp. 221\u2013235).","DOI":"10.1007\/978-3-319-25645-0_15"},{"key":"10167_CR48","doi-asserted-by":"crossref","unstructured":"Singh, M.P., Sural, S., Atluri, V., & Vaidya, J. (2019a). Security analysis of unified access control policies. In International conference on secure knowledgement management in artificial intelligence Era.","DOI":"10.1007\/978-981-15-3817-9_8"},{"key":"10167_CR49","doi-asserted-by":"crossref","unstructured":"Singh, M.P., Sural, S., Vaidya, J., & Atluri, V. (2019b). Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. Computers & Security 183\u2013205.","DOI":"10.1016\/j.cose.2019.06.001"},{"key":"10167_CR50","doi-asserted-by":"crossref","unstructured":"Stoller, S.D., Yang, P., Ramakrishnan, C.R., & Gofman, M.I. (2007). Efficient policy analysis for administrative role based access control. In Proceedings of the 14th ACM conference on computer and communications security (pp. 445\u2013455).","DOI":"10.1145\/1315245.1315300"},{"issue":"3","key":"10167_CR51","doi-asserted-by":"publisher","first-page":"399","DOI":"10.3233\/JCS-2010-0418","volume":"19","author":"M Toahchoodee","year":"2011","unstructured":"Toahchoodee, M., & Ray, I. (2011). On the formalization and analysis of a spatio-temporal role-based access control model. Journal of Computer Security, 19(3), 399\u2013452.","journal-title":"Journal of Computer Security"},{"key":"10167_CR52","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1007\/s10796-019-09956-4","volume":"21","author":"S Trang","year":"2019","unstructured":"Trang, S., & Brendel, B. (2019). A meta-analysis of deterrence theory in information security policy compliance research. Information Systems Frontiers, 21, 1265\u20131284.","journal-title":"Information Systems Frontiers"},{"key":"10167_CR53","doi-asserted-by":"crossref","unstructured":"Uzun, E., Atluri, V., Sural, S., Vaidya, J., Parlato, G., Ferrara, A.L., & Parthasarathy, M. (2012). Analyzing temporal role based access control models. In Proceedings of the 17th ACM symposium on access control models and technologies (pp. 177\u2013186).","DOI":"10.1145\/2295136.2295169"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-021-10167-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-021-10167-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-021-10167-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T02:03:19Z","timestamp":1740535399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-021-10167-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10167"],"URL":"https:\/\/doi.org\/10.1007\/s10796-021-10167-z","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"25 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}