{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T00:34:50Z","timestamp":1722645290458},"reference-count":21,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2003,3]]},"DOI":"10.1080\/08874417.2003.11647515","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:28:45Z","timestamp":1722616125000},"page":"40-49","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Object Oriented Role-Based Access Control Model with Mandatory Access Control Principles"],"prefix":"10.1080","volume":"43","author":[{"given":"Chang N.","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Regina, TRLabs Regina, Saskatchewan, Canada S4S 0A2"}]},{"given":"Cungang","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Regina, TRLabs Regina, Saskatchewan, Canada S4S 0A2"}]}],"member":"301","published-online":{"date-parts":[[2016,2]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/RISP.1990.63840","volume-title":"Proc. 1990 Symposium on Research in Security & Privacy","author":"Jajodia S.","year":"1990","unstructured":"Jajodia, S. and B. Kogan. \u201cIntegrating an Object-oriented Data Model with Multilevel Security.\u201d In Proc. 1990 Symposium on Research in Security & Privacy, IEEE Computer Society Press, May 1990, pp. 76\u201385."},{"key":"e_1_2_1_5_1","volume-title":"Annual Computer Security Applications Conference","author":"Ferraiolo D.","year":"1995","unstructured":"Ferraiolo, D., J. Cugini, and D.R. Kulin. \u201cRole Based Access Control: Features and Motivation.\u201d In Annual Computer Security Applications Conference, IEEE Computer Society Press, 1995."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the First ACM Workshop on Role Based Access Control.","author":"Sandhu R.","year":"1996","unstructured":"Sandhu, R., E.J. Coyne, and C. E. Youman, (Eds.). Proceedings of the First ACM Workshop on Role Based Access Control. ACM, 1996."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_1_8_1","first-page":"41","volume-title":"Second ACM Workshop on Role-based Access Control","author":"Sandhu R.","year":"1997","unstructured":"Sandhu, R. and V. Bhamidipati. \u201cThe ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline,\u201d Second ACM Workshop on Role-based Access Control, Fairfax, Virginia, November 1997, pp. 41\u201354."},{"key":"e_1_2_1_9_1","first-page":"95","volume-title":"Second ACM Workshop on Role-based Access Control","author":"Jaeger T.","year":"1997","unstructured":"Jaeger, T. and Federquegiraud. \u201cA Role-based Access Control Model for Protection Domain Derivation and Management,\u201d Second ACM Workshop on Role-based Access Control, Fairfax, Virginia, November 1997, pp. 95\u2013108."},{"key":"e_1_2_1_10_1","first-page":"128","volume-title":"2001 IEEE Canadian Conference on Electrical and Computer Engineering","author":"Zhang C.N.","year":"2001","unstructured":"Zhang, C.N. and C. Yang. \u201cSpecification and Enforcement of Object-oriented RBAC Model,\u201d 2001 IEEE Canadian Conference on Electrical and Computer Engineering, Toronto, May 2001, pp. 128\u2013135."},{"key":"e_1_2_1_11_1","first-page":"24","volume-title":"2001 IEEE\/IFIP Conference on Software Architecture","author":"Zhang C.N.","year":"2001","unstructured":"Zhang, C.N. and C. Yang. \u201cAn Object-oriented RBAC Model for Distributed Systems,\u201d 2001 IEEE\/IFIP Conference on Software Architecture, WICSA 2001, The Netherlands, August 2001, pp. 24\u201332."},{"key":"e_1_2_1_12_1","first-page":"31","volume-title":"Proceedings of the Second ACM Workshop on Role-based Access Control","author":"Osborn S.","year":"1997","unstructured":"Osborn, S. \u201cMandatory Access Control and Role-based Access Control Revisited,\u201d Proceedings of the Second ACM Workshop on Role-based Access Control, 1997, pp. 31\u201340."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/3-540-61770-1_28","volume-title":"Computer Security-ESORICS, 96.","author":"Sandhu R.","year":"1996","unstructured":"Sandhu, R. \u201cRole Hierarchies and Constraints for Lattice-based Access Control,\u201d Computer Security-ESORICS, 96. Springer-Verlag, 1996, Lecture Notes 1146, pp. 65\u201379."},{"key":"e_1_2_1_15_1","first-page":"129","volume-title":"Proceedings of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security.","author":"Nyanchama M.","year":"1996","unstructured":"Nyanchama, M. and S.L. Osborn. \u201cModeling Mandatory Access Control in Role Based Security Systems.\u201d In Spooner, D., S. Demurjian, and J. Dobson (Eds.). Proceedings of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security. Chapman & Hall, 1996, pp. 129\u2013144."},{"key":"e_1_2_1_16_1","volume-title":"UML Resource Center","author":"United Modeling Language","unstructured":"United Modeling Language. UML Resource Center, http:\/\/www.rational.com."},{"key":"e_1_2_1_17_1","volume-title":"Journal of Information Science and Engineering (JISE)","author":"Zhang C.N.","year":"2002","unstructured":"Zhang, C.N. and C. Yang. \u201cDesigning of a Complete Model of Object-oriented Role-based Access Control System for Distributed Networks,\u201d Journal of Information Science and Engineering (JISE), accepted and will be published in September 2002."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_2_1_19_1","first-page":"45","volume-title":"ICFPOO, ACM","author":"Potter F.","year":"2000","unstructured":"Potter, F. and S. Conchon. \u201cInformation Flow in Inference for Free,\u201d ICFPOO, ACM, 2000, pp. 45\u201357."},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/CSFW.2001.930141","volume-title":"Proc. 14th IEEE Computer Security Foundations Workshop","author":"Smith G.","year":"2001","unstructured":"Smith, G. \u201cA New Type System for Secure Information Flow,\u201d Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001, IEEE, 2001, pp. 115\u2013125."},{"key":"e_1_2_1_21_1","volume-title":"Secure Computer Systems: Mathematical Foundations and Model.","author":"Bell D.E.","year":"1975","unstructured":"Bell, D.E. and L.J. Lapadula. Secure Computer Systems: Mathematical Foundations and Model. Bellford, MA: Mitre Corp., 1975."},{"key":"e_1_2_1_22_1","volume-title":"Proc. IEEE Symp. On Security and Privacy","author":"Jajodia S.","year":"1990","unstructured":"Jajodia, S. and B. Kogan. \u201cIntegrating an Object-oriented Data Model with Multilevel Security,\u201d Proc. IEEE Symp. On Security and Privacy, Oakland, CA, May 1990."}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2003.11647515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:29:59Z","timestamp":1722616199000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2003.11647515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2003,3]]}},"alternative-id":["10.1080\/08874417.2003.11647515"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2003.11647515","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,3]]}}}