{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T05:33:05Z","timestamp":1768455185074,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,19]],"date-time":"2013-07-19T00:00:00Z","timestamp":1374192000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s11227-013-0980-1","type":"journal-article","created":{"date-parts":[[2013,7,18]],"date-time":"2013-07-18T12:23:54Z","timestamp":1374150234000},"page":"711-722","source":"Crossref","is-referenced-by-count":75,"title":["Ontology-based access control model for security policy reasoning in cloud computing"],"prefix":"10.1007","volume":"67","author":[{"given":"Chang","family":"Choi","sequence":"first","affiliation":[]},{"given":"Junho","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Pankoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,19]]},"reference":[{"key":"980_CR1","first-page":"355","volume-title":"2011 international conference on computer, electrical, and systems sciences and engineering","author":"X Li","year":"2011","unstructured":"Li X, He J (2011) A user-centric method for data privacy protection in cloud computing. In: 2011 international conference on computer, electrical, and systems sciences and engineering, pp 355\u2013358"},{"issue":"6","key":"980_CR2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSP.2009.109","volume":"7","author":"BM Bowen","year":"2009","unstructured":"Bowen BM, Ben Salem M, Hershkop S (2009) Designing host and network sensors to mitigate the insider threat. IEEE Security Privacy Mag 7(6):22\u201329","journal-title":"IEEE Security Privacy Mag"},{"key":"980_CR3","volume-title":"Role-based access control","author":"DF Ferraiolo","year":"2003","unstructured":"Ferraiolo DF, Richard Kuhn D, Chandramouli R (2003) Role-based access control. Artech House, Norwood"},{"key":"980_CR4","first-page":"444","volume-title":"Proceedings of the 28th annual international computer software and applications conference","author":"A Corradi","year":"2004","unstructured":"Corradi A, Montanari R, Tibaldi D (2004) Context-based access control for ubiquitous service provisioning. In: Proceedings of the 28th annual international computer software and applications conference, Sep. IEEE Press, New York, pp 444\u2013451"},{"key":"980_CR5","first-page":"757","volume-title":"Proceedings of the fifth international conference on computer and information technology","author":"W Han","year":"2005","unstructured":"Han W, Zhang J, Yao X (2005) Context-sensitive access control model and implementation. In: Proceedings of the fifth international conference on computer and information technology. IEEE Press, New York, pp 757\u2013763"},{"key":"980_CR6","unstructured":"Cappelli D, Moore A, Trzeciak R, Shimeall TJ (2006) Common sense guide to prevention and detection of insider threats. Carnegie Mellon University"},{"issue":"4","key":"980_CR7","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"G-J Ahn","year":"2000","unstructured":"Ahn G-J, Sandhu R (2000) Role-based authorization constraints specification. ACM Trans Inf Syst Secur 3(4):207\u2013226","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"3","key":"980_CR8","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino E, Bonatti PA, Ferrari E (2001) Trbac: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3):191\u2013233","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"1","key":"980_CR9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"JBD Joshi","year":"2005","unstructured":"Joshi JBD, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4\u201323","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"980_CR10","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"N Li","year":"2006","unstructured":"Li N, Tripunitara MV (2006) Security analysis in role-based access control. ACM Trans Inf Syst Secur 9(4):391\u2013420","journal-title":"ACM Trans Inf Syst Secur"},{"key":"980_CR11","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1377836.1377849","volume-title":"Proceedings of the 13th ACM symposium on access control models and technologies","author":"T Finin","year":"2008","unstructured":"Finin T, Joshi A, Kagal L, Niu J, Sandhu R, Winsborough W, Thuraisingham B (2008) ROWLBAC: representing role based access control in OWL. In: Proceedings of the 13th ACM symposium on access control models and technologies. ACM, New York, pp 73\u201382"},{"key":"980_CR12","volume-title":"Proceedings of the 11th international conference on integrated design and process technology (IDPT 2008)","author":"A Macfie","year":"2008","unstructured":"Macfie A, Kataria P, Koay N, Dagdeviren H, Juric R, Madani K (2008) Ontology based access control derived from dynamic RBAC and its context constraints. In: Proceedings of the 11th international conference on integrated design and process technology (IDPT 2008), Taichung, Taiwan, 1\u20136 June 2008"},{"key":"980_CR13","unstructured":"Kalajainen T (2007) An access control model in a semantic data structure: case process modelling of a bleaching line. Department of Computer Science and Engineering"},{"issue":"3","key":"980_CR14","first-page":"67","volume":"2","author":"M Nabeel Tahir","year":"2007","unstructured":"Nabeel Tahir M (2007) C-RBAC: Contextual role-based access control model. Ubiquitous Comput Commun J 2(3):67\u201374","journal-title":"Ubiquitous Comput Commun J"},{"issue":"5","key":"980_CR15","first-page":"71","volume":"18","author":"J-h Eom","year":"2008","unstructured":"Eom J-h, Park S-H, Chung T-M (2008) A study on architecture of access control system with enforced security control for ubiquitous computing environment. J Korean Inst Inf Secur Cryptol 18(5):71\u201381","journal-title":"J Korean Inst Inf Secur Cryptol"},{"issue":"2","key":"980_CR16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38\u201347","journal-title":"Computer"},{"issue":"2","key":"980_CR17","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/j.jnca.2008.02.015","volume":"32","author":"D Zoua","year":"2009","unstructured":"Zoua D, Heb L, Jina H, Chenc X (2009) CRBAC: imposing multi-grained constraints on the RBAC model in the multi-application environment. J Netw Comput Appl 32(2):402\u2013411","journal-title":"J Netw Comput Appl"},{"issue":"3\/4","key":"980_CR18","first-page":"54","volume":"2","author":"C Choi","year":"2012","unstructured":"Choi C, Choi J, Ko B, Oh K, Kim P (2012) A design of onto-ACM(Ontology based access control model) in cloud computing environments. J Internet Serv Inf Secur 2(3\/4):54\u201364","journal-title":"J Internet Serv Inf Secur"},{"key":"980_CR19","unstructured":"Apache Jena Project (2013). http:\/\/jena.apache.org\/"},{"issue":"1","key":"980_CR20","first-page":"4","volume":"1","author":"S Kiyomoto","year":"2011","unstructured":"Kiyomoto S, Fukushima K, Miyake Y (2011) Towards secure cloud computing architecture\u2014a solution based on software protection mechanism. J Internet Serv Inf Secur 1(1):4\u201317","journal-title":"J Internet Serv Inf Secur"},{"issue":"1","key":"980_CR21","first-page":"75","volume":"2","author":"W Pieters","year":"2011","unstructured":"Pieters W (2011) Representing humans in system security models: an actor-network approach. J Wirel Mobile Netw Ubiquitous Comput Depend Appl 2(1):75\u201392","journal-title":"J Wirel Mobile Netw Ubiquitous Comput Depend Appl"},{"issue":"3","key":"980_CR22","first-page":"53","volume":"2","author":"TA Zia","year":"2011","unstructured":"Zia TA, Zomaya AY (2011) A lightweight security framework for wireless sensor networks. J Wirel Mobile Netw Ubiquitous Comput Depend Appl 2(3):53\u201373","journal-title":"J Wirel Mobile Netw Ubiquitous Comput Depend Appl"},{"issue":"1","key":"980_CR23","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.ins.2010.08.042","volume":"182","author":"JJ Jung","year":"2012","unstructured":"Jung JJ (2012) Evolutionary approach for semantic-based query sampling in large-scale information sources. Inf Sci 182(1):30\u201339","journal-title":"Inf Sci"},{"issue":"4","key":"980_CR24","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1007\/s10796-011-9315-z","volume":"14","author":"JJ Jung","year":"2012","unstructured":"Jung JJ (2012) ContextGrid: a contextual mashup-based collaborative browsing system. Inf Syst Front 14(4):953\u2013961","journal-title":"Inf Syst Front"},{"issue":"3","key":"980_CR25","doi-asserted-by":"crossref","first-page":"2206","DOI":"10.1016\/j.eswa.2010.08.008","volume":"38","author":"JJ Jung","year":"2011","unstructured":"Jung JJ (2011) Service chain-based business alliance formation in service-oriented architecture. Expert Syst Appl 38(3):2206\u20132211","journal-title":"Expert Syst Appl"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0980-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-0980-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0980-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:24:10Z","timestamp":1559384650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-0980-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,19]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["980"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-0980-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,19]]}}}