{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T08:58:02Z","timestamp":1683104282590},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2009,12,31]],"date-time":"2009-12-31T00:00:00Z","timestamp":1262217600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s11235-009-9239-9","type":"journal-article","created":{"date-parts":[[2009,12,30]],"date-time":"2009-12-30T15:59:33Z","timestamp":1262188773000},"page":"111-125","source":"Crossref","is-referenced-by-count":9,"title":["GTHBAC: A Generalized Temporal History Based Access Control Model"],"prefix":"10.1007","volume":"45","author":[{"given":"Ali Noorollahi","family":"Ravari","sequence":"first","affiliation":[]},{"given":"Jafar Haadi","family":"Jafarian","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,31]]},"reference":[{"key":"9239_CR1","unstructured":"Abadi, M., & Fournet, C. (2003). Access control based on execution history. In Proceedings of the 10th annual network and distributed system security symposium (pp.\u00a0107\u2013121)."},{"issue":"1","key":"9239_CR2","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/69.485637","volume":"8","author":"E. Bertino","year":"1996","unstructured":"Bertino, E., Bettini, C., Ferrari, E., & Samarati, P. (1996). A\u00a0temporal access control mechanism for database systems. IEEE Transactions on Knowledge Data Engineering, 8(1), 67\u201380.","journal-title":"IEEE Transactions on Knowledge Data Engineering"},{"issue":"3","key":"9239_CR3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., & Samarati, P. (1998). An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3), 231\u2013285.","journal-title":"ACM Transactions on Database Systems"},{"key":"9239_CR4","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bettini, C., & Samarati, P. (1994). A temporal authorization model. In Second ACM conference on computer and communications security (pp.\u00a0126\u2013135), Fairfax, VA.","DOI":"10.1145\/191177.191202"},{"key":"9239_CR5","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/JCS-2000-8404","volume":"8","author":"E. Bertino","year":"2000","unstructured":"Bertino, E., Bonatti, P. A., Ferrari, E., & Sapino, M.\u00a0L. (2000). Temporal authorization bases: From specification to integration. Journal of Computer Security, 8, 309\u2013353.","journal-title":"Journal of Computer Security"},{"issue":"3","key":"9239_CR6","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., & Samarati, P. (2002). A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3), 241\u2013272.","journal-title":"Journal of Computer Security"},{"key":"9239_CR7","first-page":"215","volume-title":"IEEE symposium research in security and privacy","author":"D. F. C. Brewer","year":"1989","unstructured":"Brewer, D. F. C., & Nash, M. J. (1989). The chinese wall security policy. In IEEE symposium research in security and privacy (pp.\u00a0215\u2013228). Los Alamitos: IEEE Comput. Soc."},{"key":"9239_CR8","doi-asserted-by":"crossref","unstructured":"Dias, P., Ribeiro, C., & Ferreira, P. (2003). Enforcing history-based security policies in mobile agent systems. In IEEE 4th international workshop on policies for distributed systems and networks.","DOI":"10.1109\/POLICY.2003.1206977"},{"key":"9239_CR9","doi-asserted-by":"crossref","unstructured":"Edjlali, G., Acharya, A., & Chaudhary, V. (1998). History-based access control for mobile code. In 5th ACM conference on computer and communications security (pp.\u00a038\u201348).","DOI":"10.1145\/288090.288102"},{"key":"9239_CR10","first-page":"997","volume-title":"Handbook of theoretical computer science, B: Formal models and semantics (B)","author":"E. A. Emerson","year":"1990","unstructured":"Emerson, E. A. (1990). Temporal modal logic. In Handbook of theoretical computer science, B: Formal models and semantics (B) (pp.\u00a0997\u20131072). Cambridge: MIT Press."},{"key":"9239_CR11","unstructured":"ISO\/IEC:10181-3 (1995). Information technology\u2014open systems interconnection\u2014security frameworks for open systems: Access control framework."},{"issue":"2","key":"9239_CR12","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M. L., & Subrahmanian, V. S. (2001). Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2), 214\u2013260.","journal-title":"ACM Transactions on Database Systems"},{"key":"9239_CR13","unstructured":"Javanmardi, S., Amini, A., & Jalili, R. (2006). An access control model for protecting semantic web resources. In Web policy workshop (pp.\u00a032\u201346), Athens, GA, USA."},{"key":"9239_CR14","unstructured":"Javanmardi, S., Amini, A., Jalili, R., & Ganjisafar, Y. (2006). Sbac: \u201ca semantic-based access control model\u201d. In NORDSEC-2006."},{"key":"9239_CR15","unstructured":"Moses, T. (2005). Extensible access control markup language, version 2.0 (Technical report). OASIS Standard."},{"key":"9239_CR16","doi-asserted-by":"crossref","unstructured":"Ravari, A. N., Amini, M., & Jalili, R. (2008). A semantic aware access control model with real time constraints on history of accesses. In 3rd international workshop on secure information systems (SIS\u201908), Poland, Wisla. IEEE Digital Library.","DOI":"10.1109\/IMCSIT.2008.4747338"},{"key":"9239_CR17","unstructured":"Ravari, A. N., Amini, M., & Jalili, R. (2008). A temporal semantic based access control model. In 13th Int\u2019l CSI computer conference (CSICC\u201908), Kish island, Iran."},{"key":"9239_CR18","doi-asserted-by":"crossref","unstructured":"Ravari, A. N., Amini, M., Jalili, R., & Jafarian, J. H. (2008). A\u00a0semantic aware history based access control model using logical time approach.","DOI":"10.1109\/ICCITECHN.2008.4803125"},{"key":"9239_CR19","doi-asserted-by":"crossref","unstructured":"Ruan, C. (2003). Decentralized temporal authorization administration (Technical Report CIT\/27\/2003).","DOI":"10.1007\/978-3-540-45227-0_89"},{"key":"9239_CR20","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of security analysis and design (FOSAD)","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., & Vimercati, S. (2001). Access control: Policies, models, and mechanisms. In Lecture notes in computer science : Vol. 2171. Foundations of security analysis and design (FOSAD), Bertinoro, Italy (pp. 137\u2013196). Berlin: Springer."},{"key":"9239_CR21","unstructured":"Thomas, R. K., & Sandhu, R. S. (1997). Task-based authorization controls (tbac): A family of models for active and enterprise-oriented authorization management. In IFIP WG11 (pp.\u00a0166\u2013181)."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9239-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-009-9239-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9239-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:07Z","timestamp":1559386207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-009-9239-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,31]]},"references-count":21,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["9239"],"URL":"https:\/\/doi.org\/10.1007\/s11235-009-9239-9","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12,31]]}}}