{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T19:15:47Z","timestamp":1694459747316},"reference-count":17,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1016\/s0169-023x(02)00130-1","type":"journal-article","created":{"date-parts":[[2002,10,7]],"date-time":"2002-10-07T19:24:03Z","timestamp":1034018643000},"page":"317-333","source":"Crossref","is-referenced-by-count":6,"title":["Integrating role graphs: a tool for security integration"],"prefix":"10.1016","volume":"43","author":[{"given":"Sylvia","family":"Osborn","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-023X(02)00130-1_BIB1","series-title":"Computer Security\u2013\u2013ESORICS96","first-page":"183","article-title":"Merging heterogeneous security orderings","volume":"1146","author":"Bonatti","year":"1996"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB2","series-title":"Database Security","author":"Castano","year":"1994"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB3","doi-asserted-by":"crossref","unstructured":"Oracle Corporation. Oracle Version 7, Chapters 6 & 7. http:\/\/www.oracle.com\/products\/oracle7\/server\/whitepapers\/security\/html\/chap_6.html, 1995","DOI":"10.1016\/1353-4858(95)90270-8"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB4","series-title":"Computer Security\u2013\u2013ESORICS96","first-page":"99","article-title":"An authorization model for federated systems","volume":"1146","author":"di Virmercati","year":"1996"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB5","unstructured":"L. Hua, S. Osborn, Modeling unix access control with a role graph, in: Proceedings of International Conference on Computers and Information, June 1998"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB6","unstructured":"D. Jonscher, K.R. Dittrich, An approach for building secure database federations, in: Proceedings of 20th VLDB Conference, 1994 pp. 24\u201335"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB7","series-title":"Database Security IX, Status and Prospects. Ninth IFIP WG11.3 Working Conference on Database Security","first-page":"43","article-title":"Argos\u2013\u2013a configurable access control system for interoperable environments","author":"Jonscher","year":"1995"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB8","series-title":"Database Security, VIII, Status and Prospects WG11.3 Working Conference on Database Security","first-page":"37","article-title":"Access rights administration in role-based security systems","author":"Nyanchama","year":"1994"},{"issue":"1","key":"10.1016\/S0169-023X(02)00130-1_BIB9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/300830.300832","article-title":"The role graph model and conflict of interest","volume":"2","author":"Nyanchama","year":"1999","journal-title":"ACM TISSEC"},{"issue":"2","key":"10.1016\/S0169-023X(02)00130-1_BIB10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/354876.354878","article-title":"Configuring role-based access control to enforce mandatory and discretionary access control policies","volume":"3","author":"Osborn","year":"2000","journal-title":"ACM TISSEC"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB11","doi-asserted-by":"crossref","unstructured":"S.L. Osborn, Mandatory access control and role-based access control revisited, in: Proceedings of the Second ACM Workshop on Role-Based Access Control, Nov. 1997, 31\u201340","DOI":"10.1145\/266741.266751"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB12","series-title":"Proceedings of the Tenth Annual IFIP WG 11.3 Working Conference on Database Security","article-title":"On the interaction between role based access control and relational databases","author":"Osborn","year":"1996"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB13","series-title":"Computer Security\u2013\u2013ESORICS96","first-page":"65","article-title":"Role hierarchies and constraints for lattice-based access controls","volume":"1146","author":"Sandhu","year":"1996"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"issue":"3","key":"10.1016\/S0169-023X(02)00130-1_BIB15","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1145\/96602.96604","article-title":"Federated database systems for managing distributed, heterogeneous, and autonomous databases","volume":"22","author":"Sheth","year":"1990","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB16","series-title":"Database Security XI","first-page":"35","article-title":"Designing security agents for the DOK federated system","author":"Tari","year":"1997"},{"key":"10.1016\/S0169-023X(02)00130-1_BIB17","first-page":"33","article-title":"Pragmatics of access control in mermaid","author":"Templeton","year":"1987","journal-title":"IEEE-CS TC Data Engineering"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02001301?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02001301?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T16:10:39Z","timestamp":1583770239000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X02001301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["S0169023X02001301"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(02)00130-1","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[2002,12]]}}}