{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:24:58Z","timestamp":1761611098946,"version":"3.30.1"},"reference-count":17,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1016\/s0169-023x(02)00128-3","type":"journal-article","created":{"date-parts":[[2002,10,7]],"date-time":"2002-10-07T19:24:03Z","timestamp":1034018643000},"page":"261-280","source":"Crossref","is-referenced-by-count":1,"title":["Consistent policy enforcement in distributed systems using mobile policies"],"prefix":"10.1016","volume":"43","author":[{"given":"Susan","family":"Chapin","sequence":"first","affiliation":[]},{"given":"Don","family":"Faatz","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Amgad","family":"Fayad","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-023X(02)00128-3_BIB1","first-page":"4","article-title":"Microkernel operating system architecture and mach","volume":"14","author":"Black","year":"1995","journal-title":"Journal of Information Processing"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB2","doi-asserted-by":"crossref","unstructured":"P. Bonati, S. De Capitani di Vimercati, P. Samarati, A Modular Approach to Composing Access Control Policies, in: Proceedings of the ACM Computer and Communications Security Conference, 2000","DOI":"10.1145\/352600.352623"},{"year":"1986","series-title":"Object Oriented Programming: An Evolutionary Approach","author":"Cox","key":"10.1016\/S0169-023X(02)00128-3_BIB3"},{"issue":"5","key":"10.1016\/S0169-023X(02)00128-3_BIB4","doi-asserted-by":"crossref","DOI":"10.1109\/52.714818","article-title":"Business object component architecture","volume":"15","author":"Digre","year":"1998","journal-title":"IEEE Software"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB5","doi-asserted-by":"crossref","unstructured":"V. Doshi, A. Fayad, S. Jajodia, R. MacLean, Using attribute certificates with mobile policies in electroniccommerce applications, in: Proceedings of 16th Annual Computer Security Applications Conference, New Orleans, LA, December 2000, pp. 298\u2013307","DOI":"10.1109\/ACSAC.2000.898884"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB6","doi-asserted-by":"crossref","unstructured":"A. Fayad, S. Jajodia, D. Faatz, V. Doshi, Going beyond MAC and DAC using mobile policies, in: Proceedings of 16th IFIP International Conference on Information Security, Paris, France, June 2001","DOI":"10.1007\/0-306-46998-7_17"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB7","unstructured":"S.E. Minear, Providing Policy Control Over Object Operations in a Mach Based System, Secure Computing Corporation, Roseville, MN, April 1995"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB8","unstructured":"S.E. Minear, Controlling Mach Operations for use in Secure and Safety-Critical Systems, Secure Computing Corporation, Roseville, MN, June 1994"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB9","unstructured":"Object Management Group (OMG), Resource Access Decision (RAD), OMG document corbamed\/99-03-02, March 1999"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB10","unstructured":"Object Management Group (OMG), Transaction Service Specification"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB11","unstructured":"B. Plotkin, S. Garone, Apple\u2019s WebObjects: Innovative Engineering + Internet Standards = Industrial-Strength Web Application Server, IDC, Framingham, MA"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB12","doi-asserted-by":"crossref","unstructured":"R. Simon, M.E. Zurko, Separation of duty in role-based environments, in: Proceedings of the 10th Computer Security Foundations Workshop, June 1997","DOI":"10.1109\/CSFW.1997.596811"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB13","unstructured":"US Department of Commerce\/National Institute for Standards and Technology, Standard Security Label for Information Transfer, FIPS PUB 188, September 1994"},{"issue":"3","key":"10.1016\/S0169-023X(02)00128-3_BIB14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.121508","article-title":"Mediators in the architecture of future information systems","volume":"25","author":"Wiederhold","year":"1992","journal-title":"IEEE Computer"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB15","unstructured":"X\/Open Company Ltd., Distributed Transaction Processing: The TxRPC Specification, X\/Open document P305, Reading, UK"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB16","unstructured":"X\/Open Company Ltd., Distributed Transaction Processing: The XATMI Specification, X\/Open document P305, Reading, UK"},{"key":"10.1016\/S0169-023X(02)00128-3_BIB17","doi-asserted-by":"crossref","unstructured":"M.E. Zurko, R. Simon, T. Sanfilippo, A user-centered, modular authorization service built on an RBAC foundation, in: Proceedings of IEEE Symposium on Security and Privacy, May 1999","DOI":"10.1109\/SECPRI.1999.766718"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02001283?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02001283?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T08:02:27Z","timestamp":1733817747000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X02001283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["S0169023X02001283"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(02)00128-3","relation":{},"ISSN":["0169-023X"],"issn-type":[{"type":"print","value":"0169-023X"}],"subject":[],"published":{"date-parts":[[2002,12]]}}}