{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:43:05Z","timestamp":1725745385313},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642401725"},{"type":"electronic","value":"9783642401732"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40173-2_23","type":"book-chapter","created":{"date-parts":[[2013,8,17]],"date-time":"2013-08-17T01:38:34Z","timestamp":1376703514000},"page":"274-288","source":"Crossref","is-referenced-by-count":1,"title":["An XML-Based Policy Model for Access Control in Web Applications"],"prefix":"10.1007","author":[{"given":"Tania","family":"Basso","sequence":"first","affiliation":[]},{"given":"Nuno","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Regina","family":"Moraes","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-0-387-70992-5_8","volume-title":"Privacy-Preserving Data Mining","author":"E. Bertino","year":"2008","unstructured":"Bertino, E., Lin, D., Jiang, W.: A Survey of Quantification of Privacy Preserving Data Mining Algorithms. In: Aggarwal, C.C., Yu, P.S., Elmagarmid, A.K. (eds.) Privacy-Preserving Data Mining, vol.\u00a034, pp. 183\u2013205. Springer, US (2008)"},{"key":"23_CR2","unstructured":"Internet Engineering Task Force (IETF), http:\/\/www.ietf.org\/ (accessed: September 07, 2012)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ghinita, G., Kamra, A.: Access Control for Databases: Concepts and Systems. Now Publishers Inc. (2011)","DOI":"10.1561\/9781601984173"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Role-based Access Control. In: Advances in Computers, vol.\u00a046, pp. 237\u2013286. Elsevier (1998)","DOI":"10.1016\/S0065-2458(08)60206-5"},{"issue":"4","key":"23_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2009.102","volume":"7","author":"Q. Ni","year":"2009","unstructured":"Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-Aware Role-Based Access Control. IEEE Security Privacy\u00a07(4), 35\u201343 (2009)","journal-title":"IEEE Security Privacy"},{"key":"23_CR6","unstructured":"OASIS eXtensible Access Control Markup Language (XACML) TC | OASIS, https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml (accessed: September 07, 2012)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-28166-2_7","volume-title":"Engineering Secure Software and Systems","author":"M. Masi","year":"2012","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and Implementation of the XACML Access Control Mechanism. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol.\u00a07159, pp. 60\u201374. Springer, Heidelberg (2012)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Bernard Stepien, S.M.: Advantages of a non-technical XACML notation in role-based models, pp. 193\u2013200 (2011)","DOI":"10.1109\/PST.2011.5971983"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Samarati, P., de, S., di Vimercati, C.: Access Control: Policies, Models, and Mechanisms. In: Foundations of Security Analysis and Design (Tutorial Lectures), pp. 137\u2013196 (2001)","DOI":"10.1007\/3-540-45608-2_3"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Bernard Stepien, S.M.: Advantages of a non-technical XACML notation in role-based models, pp. 193\u2013200 (2011)","DOI":"10.1109\/PST.2011.5971983"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Turkmen, F., Crispo, B.: Performance evaluation of XACML PDP implementations. In: Proceedings of the 2008 ACM Workshop on Secure Web Services, New York, NY, USA, pp. 37\u201344 (2008)","DOI":"10.1145\/1456492.1456499"},{"key":"23_CR12","unstructured":"Michael Butler, J.: Extending Role Based Access Control - A SANS Whitepaper, http:\/\/www.sans.org\/reading_room\/analysts_program\/access-control-foxt.pdf (accessed: February15, 2013)"},{"key":"23_CR13","unstructured":"P3P: The Platform for Privacy Preferences, http:\/\/www.w3.org\/P3P\/ (accessed: September 04, 2012)"},{"issue":"4","key":"23_CR14","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s00778-006-0023-0","volume":"17","author":"J.-W. Byun","year":"2008","unstructured":"Byun, J.-W., Li, N.: Purpose based access control for privacy protection in relational database systems. The VLDB Journal\u00a017(4), 603\u2013619 (2008)","journal-title":"The VLDB Journal"},{"key":"23_CR15","unstructured":"Agrawal, R., Bird, P., Grandison, T., Kiernan, J., Logan, S., Rjaibi, W.: Extending Relational Database Systems to Automatically Enforce Privacy Policies. In: Proceedings of the 21st International Conference on Data Engineering, Washington, DC, USA, pp. 1013\u20131022 (2005)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: 28th Int\u2019l Conference on Very Large Databases, Hong Kong (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"issue":"2","key":"23_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Arora, S., Song, E., Kim, Y.: Modified hierarchical privacy-aware role based access control model. In: Proceedings of the 2012 ACM Research in Applied Computation Symposium, New York, NY, USA, pp. 344\u2013347 (2012)","DOI":"10.1145\/2401603.2401679"},{"key":"23_CR19","volume-title":"Conditional Privacy-Aware Role Based Access Control","author":"Q. Ni","year":"2007","unstructured":"Ni, Q., Bertino, E.: Conditional Privacy-Aware Role Based Access Control. Springer, Heidelberg (2007)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Beznosov, K.: Requirements for access control: US Healthcare domain. In: Proceedings of the Third ACM workshop on Role-based access control, New York, NY, USA (1998)","DOI":"10.1145\/286884.286892"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Bertino, E., Carminati, B., Ferrari, E.: Access control for XML documents and data. Inf. Secur. Tech. Rep., vol. 9, no 3, pp. 19\u201334 (July 2004)","DOI":"10.1016\/S1363-4127(04)00029-9"},{"issue":"6","key":"23_CR22","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.compind.2009.02.009","volume":"60","author":"Y. Lu","year":"2009","unstructured":"Lu, Y., Zhang, L., Sun, J.: Task-activity based access control for process collaboration environments. Comput. Ind.\u00a060(6), 403\u2013415 (2009)","journal-title":"Comput. Ind."},{"issue":"1","key":"23_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1057977.1057979","volume":"37","author":"W. Tolone","year":"2005","unstructured":"Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Comput. Surv.\u00a037(1), 29\u201341 (2005)","journal-title":"ACM Comput. Surv."},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Samarati, P., Jajodia, S.: Policies, models, and languages for access control. In: Databases in Networked Information Systems, pp. 225\u2013237 (2005)","DOI":"10.1007\/978-3-540-31970-2_18"},{"key":"23_CR25","unstructured":"Regina L\u00facia de Oliveira Moraes, http:\/\/www.ft.unicamp.br\/~regina\/Gerais\/Request-database-administrator-detailed.pdf (Accessed: April 9, 2013)"},{"key":"23_CR26","unstructured":"Sybase XML Modeling PowerDesigner\u00ae 15.3, http:\/\/wwwdownload.sybase.com\/pdfdocs\/pdd1100e\/xmug.pdf (accessed: April 09, 2013])"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Zhu, H., L\u00fc, K.: Fine-grained access control for database management systems. In: Proceedings of the 24th British National Conference on Databases, Berlin, Heidelberg, pp. 215\u2013223 (2007)","DOI":"10.1007\/978-3-540-73390-4_24"},{"key":"23_CR28","unstructured":"ROLE-BASED ACCESS CONTROL A Position Statement, http:\/\/profsandhu.com\/misc_pubs\/nist\/n94rbac.pdf (accessed: January 29, 2013)"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Miseldine, P.L.: Automated XACML Policy Reconfiguration for Evaluation Otimisation. In: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems (SESS 2008), pp. 1\u20138. ACM, New York (2008)","DOI":"10.1145\/1370905.1370906"},{"key":"23_CR30","unstructured":"TPC-W, http:\/\/www.tpc.org\/tpcw\/ (accessed: January 08, 2013)"},{"key":"23_CR31","unstructured":"Oracle | Hardware and Software, Engineered to Work Together, http:\/\/www.oracle.com\/index.html (accessed: January 29, 2013)"},{"key":"23_CR32","unstructured":"Apache JMeter - Apache JMeterTM, http:\/\/jmeter.apache.org\/ (accessed: January 09, 2013)"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40173-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T00:15:45Z","timestamp":1596327345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40173-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642401725","9783642401732"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40173-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}