{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T13:08:53Z","timestamp":1648904933458},"reference-count":19,"publisher":"Elsevier BV","issue":"17","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1016\/s0140-3664(00)00244-9","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T20:56:47Z","timestamp":1027630607000},"page":"1584-1593","source":"Crossref","is-referenced-by-count":11,"title":["The application of security policy to role-based access control and the common data security architecture"],"prefix":"10.1016","volume":"23","author":[{"given":"A","family":"Lin","sequence":"first","affiliation":[]},{"given":"R","family":"Brown","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(00)00244-9_BIB1","doi-asserted-by":"crossref","unstructured":"R. Anderson, A security policy model for clinical information systems, in: Proceedings of the 17th IEEE Symposium on Security and Privacy, 1996, pp. 30\u201343.","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB2","doi-asserted-by":"crossref","unstructured":"R.W. Baldwin, Naming and grouping privileges to simplify security management in large databases, in: Proceedings of the IEEE Symposium on Computer Security and Privacy, 1990, pp. 116\u2013132.","DOI":"10.1109\/RISP.1990.63844"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB3","doi-asserted-by":"crossref","unstructured":"J. Barkley, Implementing role based access control using object technology, First ACM\/NIST Workshop on Role-Based Access Control, 1995 (http:\/\/hissa.ncsl.nist.gov\/rbac\/rbacot\/titlewkshp.html).","DOI":"10.1145\/270152.270192"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB4","series-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects","first-page":"185","article-title":"The role of trust management in distributed system security","author":"Blaze","year":"1999"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB5","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, A. Keromytis, KeyNote: trust management for public key infrastructures, in: Proceedings of the 6th International Workshop on Security Protocols, 1998, pp. 59\u201363.","DOI":"10.1007\/3-540-49135-X_9"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB6","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, J. Lacy, Decentralized trust management, in: Proceedings of the 17th IEEE Symposium on Security and Privacy, 1996, pp. 164\u2013173 (ftp:\/\/ftp.research.att.com\/dist\/mab\/policymaker.ps).","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB7","first-page":"127","article-title":"REFEREE: trust management for web applications","volume":"2","author":"Chu","year":"1997","journal-title":"Journal of World Wide Web"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB8","unstructured":"Common Data Security Architecture (CDSA) (http:\/\/developer.intel.com\/ial\/security\/)."},{"key":"10.1016\/S0140-3664(00)00244-9_BIB9","unstructured":"D.F. Ferraiolo, J.A. Cugini, D.R. Kuhn, Role-based access control (RBAC): features and motivations, in: Proceedings of 11th Annual Computer Security Applications Conference, 1995, pp. 241\u2013248 (http:\/\/hissa.ncsl.nist.gov\/rbac\/newspaper\/rbac.html)."},{"key":"10.1016\/S0140-3664(00)00244-9_BIB10","unstructured":"D.F. Ferraiolo, D.R. Kuhn, Role-based access control, in: Proceedings of the 15th NIST-NSA Nat. (U.S.) Computer Security Conference, 1992, pp. 554\u2013563."},{"key":"10.1016\/S0140-3664(00)00244-9_BIB11","doi-asserted-by":"crossref","unstructured":"L. Giuri, P. Iglio, A formal model for role based access control with constraints, in: Proceedings of the Computer Security Foundations Workshop, 1996, pp. 136\u2013145.","DOI":"10.1109\/CSFW.1996.503698"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB12","unstructured":"A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, Y. Ravid, Access control meets public key infrastructure, or: assigning roles to strangers (http:\/\/www.hrl.il.ibm.com\/TrustEstablishment\/paper.htm)."},{"key":"10.1016\/S0140-3664(00)00244-9_BIB13","doi-asserted-by":"crossref","unstructured":"W. Johnston, S. Mudumbai, M. Thompson, Authorization and attribute certificates for widely distributed access control, in: Proceedings of the IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-98), 1998, pp. 340\u2013345.","DOI":"10.1109\/ENABL.1998.725715"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB14","unstructured":"N. Li, J. Feigenbaum, B. Grosof, A logic-based knowledge representation for authorization with delegation, in: Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999, pp. 162\u2013174."},{"key":"10.1016\/S0140-3664(00)00244-9_BIB15","doi-asserted-by":"crossref","unstructured":"F. Massacci, Reasoning about security: a logic and a decision method for role based access control, in: Proceedings of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU\/FAPR-97), Lecture Notes in Artificial Intelligence, vol 1244, 1997, pp. 421\u2013435.","DOI":"10.1007\/BFb0035639"},{"issue":"2","key":"10.1016\/S0140-3664(00)00244-9_BIB16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"10.1016\/S0140-3664(00)00244-9_BIB17","unstructured":"K.E. Seamons, W. Winsborough, M. Winslett, Internet credential acceptance policies, in: Proceedings of the Workshop on Logic Programming for Internet Applications, July 1997 (http:\/\/www.transarc.com\/~winsboro\/papers\/CAP.html)."},{"issue":"4","key":"10.1016\/S0140-3664(00)00244-9_BIB18","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/BF02283186","article-title":"Policy driven management for distributed systems","volume":"2","author":"Sloman","year":"1994","journal-title":"Journal of Network and Systems Management"},{"issue":"3","key":"10.1016\/S0140-3664(00)00244-9_BIB19","doi-asserted-by":"crossref","first-page":"255","DOI":"10.3233\/JCS-1997-5307","article-title":"Using digital credentials on the world-wide web","volume":"5","author":"Winslett","year":"1997","journal-title":"Journal of Computer Security"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002449?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002449?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T06:22:52Z","timestamp":1579242172000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400002449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":19,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["S0140366400002449"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00244-9","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}