{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:29:30Z","timestamp":1761964170462,"version":"3.33.0"},"reference-count":18,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Integrated Manufacturing"],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1080\/09511920701196950","type":"journal-article","created":{"date-parts":[[2008,3,17]],"date-time":"2008-03-17T22:19:01Z","timestamp":1205792341000},"page":"301-324","source":"Crossref","is-referenced-by-count":4,"title":["Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises"],"prefix":"10.1080","volume":"21","author":[{"given":"T. -Y.","family":"Chen","sequence":"first","affiliation":[]},{"given":"Y. -M.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"H. -C.","family":"Chu","sequence":"additional","affiliation":[]},{"given":"C. -B.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","first-page":"450","volume":"1","author":"Alotaiby F. T.","year":"2004","journal-title":"Coding Comput."},{"doi-asserted-by":"publisher","key":"CIT0002","DOI":"10.1145\/581271.581276"},{"doi-asserted-by":"publisher","key":"CIT0003","DOI":"10.1080\/095119200130027"},{"unstructured":"Coetzee, M. and Eloff, J. H.P. Virtual Enterprise Access Control Requirements. 2003 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology. pp.285\u2013294.","key":"CIT0004"},{"unstructured":"Dridi, F., Muschall, B. and Pernul, G. Administration of an RBAC System. Proceedings of the 37th Annual Hawaii International Conference. pp.187\u2013192.","key":"CIT0005"},{"unstructured":"Frenkel, A., Afsarmanesh, H., Garita, C. and Hertzberger, L. O. Supporting information access rights and visibility levels in virtual enterprise. Second IFIP working Conference on Infrastructures for Virtual Organizations: Managing Cooperation in Virtual Organizations and Electronic Business towards Smart Organizations. IFIP TC5\/WG5.3","key":"CIT0006"},{"doi-asserted-by":"publisher","key":"CIT0007","DOI":"10.1109\/MIC.2002.1036040"},{"doi-asserted-by":"publisher","key":"CIT0008","DOI":"10.1016\/S0925-5273(98)00218-7"},{"doi-asserted-by":"crossref","unstructured":"Kern, A. Advanced features for enterprise-wide role-based access control. Computer Security Applications Conference. pp.333\u2013342.","key":"CIT0009","DOI":"10.1109\/CSAC.2002.1176305"},{"volume-title":"Object-Oriented Software Engineering","year":"2001","author":"Lethbridge T. C.","key":"CIT0010"},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/GRID.2003.1261718","author":"Lorch M.","year":"2003","journal-title":"Fourth International Workshop on Grid Computing"},{"key":"CIT0012","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1108\/eb021095","volume":"6","author":"McCaffer R.","year":"1999","journal-title":"Eng. Construct. Architec. Manage"},{"doi-asserted-by":"publisher","key":"CIT0013","DOI":"10.1016\/j.cose.2003.09.004"},{"doi-asserted-by":"crossref","unstructured":"Nwana, H., Ndumu, D., Lee, L. and Collis, J. ZEUS: a toolkit and approach for building distributed multi-agent systems. Proceedings of the 3rd Annual Conference on Autonomous Agents. pp.360\u2013361.","key":"CIT0014","DOI":"10.1145\/301136.301234"},{"doi-asserted-by":"publisher","key":"CIT0015","DOI":"10.1016\/S0306-4379(02)00029-7"},{"doi-asserted-by":"crossref","unstructured":"Park, J. S., Costello, K. P., Neven, T. M. and Diosomito, J. A. Access management for distributed systems: a composite RBAC approach for large, complex organizations. Proceedings of the 9th ACM Symposium on Access Control Models and Technologies. pp.163\u2013172.","key":"CIT0017","DOI":"10.1145\/990036.990063"},{"doi-asserted-by":"crossref","unstructured":"Ray, I., Li, N., France, R. and Kim, D. K. Constraints: using UML to visualize role-based access control constraints. Proceedings of the 9th ACM symposium on Access Control Models and Technologies. pp.115\u2013124.","key":"CIT0018","DOI":"10.1145\/990036.990054"},{"unstructured":"Shin, D., Ahn, G. J. and Park, J. S. An application of Directory Service Markup Language (DSML) for Role-based Access Control (RBAC). Computer Software and Applications Conference. pp.934\u2013939.","key":"CIT0019"}],"container-title":["International Journal of Computer Integrated Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09511920701196950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T03:59:43Z","timestamp":1738123183000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09511920701196950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,4]]}},"alternative-id":["10.1080\/09511920701196950"],"URL":"https:\/\/doi.org\/10.1080\/09511920701196950","relation":{},"ISSN":["0951-192X","1362-3052"],"issn-type":[{"type":"print","value":"0951-192X"},{"type":"electronic","value":"1362-3052"}],"subject":[],"published":{"date-parts":[[2008,4]]}}}