{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:07:43Z","timestamp":1772802463591,"version":"3.50.1"},"reference-count":22,"publisher":"Elsevier BV","issue":"13","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1016\/s1383-7621(00)00017-5","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T20:57:54Z","timestamp":1027630674000},"page":"1175-1184","source":"Crossref","is-referenced-by-count":10,"title":["Role-based access control in DCOM"],"prefix":"10.1016","volume":"46","author":[{"given":"Gail-Joon","family":"Ahn","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/S1383-7621(00)00017-5_BIB1","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/12.2185","article-title":"Data diversity: an approach to software fault-tolerance","volume":"37","author":"Ammann","year":"1988","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB2","unstructured":"C. Adams, S. Lloyd, Understanding Public-key Infrastructure: Concepts, Standards, and Deployment Considerations, Macmillan, New York, November 1999"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB3","doi-asserted-by":"crossref","unstructured":"K.P. Birman, Building Secure and Reliable Network Applications, Manning Publications, 1996","DOI":"10.1007\/3-540-63343-X_35"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB4","unstructured":"Microsoft Corporation, DCOM architecture, in: Proceedings of Microsoft Professional Developers Conference, September 1997"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB5","unstructured":"Department of Defense National Computer Security Center, Department of Defense Trusted Computer Systems Evaluation Criteria, DoD 5200.28-STD, December 1985"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB6","unstructured":"D. Rogerson, Inside COM, Micosoft Press, 1996"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB7","series-title":"Transaction Processing: Concepts and Techniques","author":"Gray","year":"1993"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB8","unstructured":"R. Grimes, Professional DCOM Programming, Wrox Press, 1997"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB9","doi-asserted-by":"crossref","unstructured":"S. Jajodia, P. Samarati, V.S. Subrahmanian, E. Bertino, A unified framework for enforcing multiple access control policies, in: Proceedings of the ACM SIGMOD International Conference on Management of Data Pages, 1997, pp. 474\u2013485","DOI":"10.1145\/253260.253364"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB10","doi-asserted-by":"crossref","unstructured":"M. Moriconi, et al., Secure software architectures, in: Proceedings of IEEE Symposium on Research in Security and Privacy, IEEE Press, New York, 1997","DOI":"10.1109\/SECPRI.1997.601320"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB11","unstructured":"Microsoft Corporation, Microsoft Windows NT Server: DCOM Technical Overview 1995, www.microsoft.com\/com\/dcom95"},{"issue":"12","key":"10.1016\/S1383-7621(00)00017-5_BIB12","first-page":"220","article-title":"System structure for software fault tolerance","volume":"SE-1","author":"Randell","year":"1995","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB13","unstructured":"R. Sandhu, G.-J. Ahn, Decentralized group hierarchies in UNIX: an experiment and lessons learned, in: Proceedings of 21st NIST-NCSC National Information Security Conference, Crystal City, VA, October 1998, pp. 486\u2013502"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB14","unstructured":"R. Sandhu, G.-J. Ahn, Group hierarchies with decentralized user assignment in Windows NT, in: Proceedings of IASTED Conference on Software Engineering, Las Vegas, NV, October 1998, pp. 352\u2013355"},{"issue":"11","key":"10.1016\/S1383-7621(00)00017-5_BIB15","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","article-title":"Lattice-based access control models","volume":"26","author":"Sandhu","year":"1993","journal-title":"IEEE Computer"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB16","doi-asserted-by":"crossref","unstructured":"R. Sandhu, Rationale for the RBAC96 family of access control models, in: Proceedings of the First ACM Workshop on Role-Based Access Control, ACM, New York, 1997","DOI":"10.1145\/270152.270167"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB17","unstructured":"R. Sandhu, V. Bhamidipati, The URA97 model for role-based administration of user-role assignment, in: T.Y. Lin, X. Qian (Eds.), Database Security XI: Status and Prospects, North-Holland, Amsterdam, 1997"},{"issue":"2","key":"10.1016\/S1383-7621(00)00017-5_BIB18","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB19","doi-asserted-by":"crossref","unstructured":"R. Sandhu, Q. Munawer, How to do discretionary access control using roles, in: Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998, pp. 47\u201354","DOI":"10.1145\/286884.286893"},{"issue":"9","key":"10.1016\/S1383-7621(00)00017-5_BIB20","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/35.312842","article-title":"Access control: principles and practice","volume":"32","author":"Sandhu","year":"1994","journal-title":"IEEE Communications"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB21","series-title":"The Computer Science and Engineering Handbook","first-page":"1929","article-title":"Authentication, access control and intrusion detection","author":"Sandhu","year":"1997"},{"key":"10.1016\/S1383-7621(00)00017-5_BIB22","doi-asserted-by":"crossref","unstructured":"N. Yialelis, E. Lupu, M. Sloman, Role-based security for distributed object systems, in: Proceedings of the IEEE Fifth Workshops on Enabling Technology: Infrastructure for Collaborative Enterprise, IEEE, New York, 1996","DOI":"10.1109\/ENABL.1996.555078"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762100000175?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762100000175?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T07:34:28Z","timestamp":1579246468000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762100000175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":22,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["S1383762100000175"],"URL":"https:\/\/doi.org\/10.1016\/s1383-7621(00)00017-5","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}