{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:45:11Z","timestamp":1743075911984,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164187"},{"type":"electronic","value":"9783642164194"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16419-4_29","type":"book-chapter","created":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T10:14:38Z","timestamp":1291198478000},"page":"283-294","source":"Crossref","is-referenced-by-count":4,"title":["Adaptive Access Control Modes Enforcement in Organizations"],"prefix":"10.1007","author":[{"given":"S\u00e9rgio","family":"Guerreiro","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Vasconcelos","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Tribolet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Atluri, V.: Panel on role engineering. In: SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, pp. 61\u201362 (2008)","DOI":"10.1145\/1377836.1377846"},{"issue":"1","key":"29_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur.\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. In: RBAC 1997: Proceedings of the Second ACM Workshop on Role-based Access Control, New York, NY, USA, pp. 1\u201312 (1997)","DOI":"10.1145\/266741.266746"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1609956.1609962","volume":"13","author":"F.E. Carminati","year":"2009","unstructured":"Carminati, F.E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur.\u00a013(1), 1\u201338 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"29_CR5","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"29_CR6","first-page":"33","volume-title":"ACSW Frontiers 2003: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003","author":"P. Hung","year":"2003","unstructured":"Hung, P., Karlapalem, K.: A secure workflow model. In: ACSW Frontiers 2003: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003, pp. 33\u201341. Australian Computer Society, Inc., Darlinghurst (2003)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Kang, M., Park, J., Froscher, J.: Access control mechanisms for inter-organizational workflow. In: SACMAT 2001: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, New York, NY, USA, pp. 66\u201374 (2001)","DOI":"10.1145\/373256.373266"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Park, J., Costello, K., Neven, T., Diosomito, J.: A composite rbac approach for large, complex organizations. In: SACMAT 2004: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, New York, NY, USA, pp. 163\u2013172 (2004)","DOI":"10.1145\/990036.990063"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The nist model for role-based access control: Towards a unified standard. In: Proceedings of the Fifth ACM Workshop on Role-based Access Control, pp. 47\u201363 (2000)","DOI":"10.1145\/344287.344301"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Smith, C.: A survey to determine federal agency needs for a role-based access control security product. In: International Symposium on Software Engineering Standards, p. 222 (1997)","DOI":"10.1109\/SESS.1997.595975"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Wolter, C., Schaad, A., Meinel, C.: Task-based entailment constraints for basic workflow patterns. In: SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, pp. 51\u201360 (2008)","DOI":"10.1145\/1377836.1377844"},{"key":"29_CR12","volume-title":"Role-Based Access control","author":"D. Ferraiolo","year":"2007","unstructured":"Ferraiolo, D., Kuhn, R., Chandramuli, R.: Role-Based Access control, 2nd edn. Artech House, Norwood (2007)","edition":"2"},{"key":"29_CR13","unstructured":"Herwig, M., Verelst, J.: Normalized Systems: Re-creating Information Technology based on Laws for Software Evolvability, Koppa (2009)"},{"key":"29_CR14","unstructured":"Department of Homeland Security Strategic Plan Fiscal Years 2008\u20132013, Homeland Security, USA (2008), \n                    \n                      http:\/\/www.dhs.org"},{"key":"29_CR15","unstructured":"Zhixiong, Z.: Scalable role organization based access control and its administration, PhD Thesis (2008)"},{"key":"29_CR16","unstructured":"Slone, S.: The Open Group Identity Management Work Area, Identity Management (March 2004)"},{"key":"29_CR17","unstructured":"IEEE830:1998, IEEE recommended practice for software requirements specifications. Technical report, Software Engineering Standards Committee of the IEEE Computer Society (1998)"},{"key":"29_CR18","volume-title":"Software Engineering, A practitioner\u2019s Approach","author":"R. Pressman","year":"1992","unstructured":"Pressman, R.: Software Engineering, A practitioner\u2019s Approach, 3rd edn. Mc Graw Hill Book Company, Europe (1992)","edition":"3"},{"issue":"4","key":"29_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"L. Kaufman","year":"2009","unstructured":"Kaufman, L.: Data Security in the World of Cloud Computing. Security & Privacy\u00a07(4), 61\u201364 (2009)","journal-title":"Security & Privacy"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Kandukuri, B., Paturi, V., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, SCC 2009, September 21-25, pp. 517\u2013520 (2009)","DOI":"10.1109\/SCC.2009.84"},{"key":"29_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0015251","volume-title":"Computer Science Today","author":"M. Shaw","year":"1995","unstructured":"Shaw, M., Garlan, D.: Formulations and Formalisms in Software Architecture. In: van Leeuwen, J. (ed.) Computer Science Today. LNCS, vol.\u00a01000, Springer, Heidelberg (1995)"}],"container-title":["Communications in Computer and Information Science","ENTERprise Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16419-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T12:01:13Z","timestamp":1553256073000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16419-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164187","9783642164194"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16419-4_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}