{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T10:24:30Z","timestamp":1749464670727,"version":"3.37.0"},"reference-count":27,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Integrated Manufacturing"],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1080\/09511920802209041","type":"journal-article","created":{"date-parts":[[2009,1,15]],"date-time":"2009-01-15T00:37:48Z","timestamp":1231979868000},"page":"225-244","source":"Crossref","is-referenced-by-count":4,"title":["Flexible authorisation in dynamic e-business environments using an organisation structure-based access control model"],"prefix":"10.1080","volume":"22","author":[{"given":"Tsung-Yi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yuh-Min","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chin-Bin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui-Chuan","family":"Chu","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Ahn, G.J. Specification and classification of role-based authorization policies, enabling technologies: infrastructure for collaborative enterprises. Proceedings of Twelfth IEEE International Workshops. pp.202\u2013207.","DOI":"10.1109\/ENABL.2003.1231408"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M. A. and Sandhu, R. A model for attribute-based user-role assignment. Computer Security Applications Conference 18th Annual. pp.353\u2013362.","DOI":"10.1109\/CSAC.2002.1176307"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581276"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Botha, R. A. and Eloff, J. H.P. Designing role hierarchies for access control in workflow systems. Computer Software and Applications Conference. pp.117\u2013122. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/CMPSAC.2001.960606"},{"key":"CIT0005","unstructured":"Cheng, E. C. An object-oriented organizational model to support dynamic role-based access control in electronic commerce applications, system sciences. Proceedings of the 32nd Annual Hawaii International Conference."},{"key":"CIT0006","volume-title":"Organization theory and design","author":"Daft R. L.","year":"1998","edition":"6"},{"key":"CIT0007","unstructured":"Dridi, F., Muschall, B. and Pernul, G. Administration of an RBAC system. Proceedings of the 37th Annual Hawaii International Conference on System Sciences. pp.187\u2013192. Washington, DC: IEEE Computer Society."},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D. F., Chandramouli, R., Ahn, G. J. and Gavrila, S. I. The role control center: features and case studies. Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies. pp.12\u201320. New York: ACM.","DOI":"10.1145\/775412.775415"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Kern, A. Advanced features for enterprise-wide role-based access control. Computer Security Applications Conference. pp.333\u2013342. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/CSAC.2002.1176305"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Kern, A., Schaad, A. and Moffett, J. An administration concept for the enterprise role-based access control model. Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies. pp.3\u201311. Como, Italy, New York: ACM.","DOI":"10.1145\/775412.775414"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Kolaczek, G. Specification and verification of constraints in role based access control for enterprise security system. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. pp.190\u2013195. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/ENABL.2003.1231406"},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"Lorch, M., Kafura, D. and Shah, S. An XACML-based policy management and authorization service for globus resources. Fourth International Workshop on Grid Computing. pp.208\u2013210. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/GRID.2003.1261718"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968563"},{"key":"CIT0014","unstructured":"Luo, J. and He, D. Research on object-oriented role-based access control model. Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'2003). pp.132\u2013135. Washington, DC: IEEE Computer Society."},{"key":"CIT0015","doi-asserted-by":"crossref","unstructured":"Moffett, J. D. Control principles and role hierarchies. Proceedings of the Third ACM Workshop on Role-based Access Control. pp.63\u201369. Fairfax, New York, VA: ACM.","DOI":"10.1145\/286884.286900"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2003.09.004"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00029-7"},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"Oh, S. and Sandhu, R. Role administration: a model for role administration using organization structure. Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies. pp.155\u2013162.","DOI":"10.1145\/507711.507737"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Park, J. S. A composite RBAC approach for large, complex organizations. Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies. pp.163\u2013172. Yorktown Heights, NY, New York: ACM.","DOI":"10.1145\/990036.990063"},{"key":"CIT0020","doi-asserted-by":"crossref","unstructured":"Park, J. S. and Hwang, J. RBAC for collaborative environments: role-based access control for collaborative enterprise in peer-to-peer computing environments. Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies. pp.93\u201399. Como, Italy, New York: ACM.","DOI":"10.1145\/775412.775424"},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"Ray, I., Li, N., France, R. and Kim, D. K. Constraints: using UML to visualize role-based access control constraints. Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies. pp.115\u2013124. Yorktown Heights, NY, New York: ACM.","DOI":"10.1145\/990036.990054"},{"key":"CIT0022","doi-asserted-by":"crossref","unstructured":"Shin, D. Role engineering: on modeling system-centric information for role engineering. Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies. pp.169\u2013178. Como, Italy, New York: ACM.","DOI":"10.1145\/775412.775434"},{"key":"CIT0023","unstructured":"Wang, C. J., Wu, J. P. and Duan, H. X. Using attribute certificate to design role-based access control. Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies. pp.216\u2013218. Washington, DC: IEEE Computer Society."},{"key":"CIT0024","doi-asserted-by":"crossref","unstructured":"Yamazaki, W., Nishiyama, H. and Mizoguchi, F. Design of collaborative agent system with access control for smart-office environment. The Tenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. pp.205\u2013210. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/ENABL.2001.953415"},{"key":"CIT0025","doi-asserted-by":"crossref","unstructured":"Yun, B. and Varadharajan, V. A logic for state transformations in authorization policies. Computer Security Foundations Workshop. pp.173\u2013182. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/CSFW.1997.596810"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937530"},{"key":"CIT0027","doi-asserted-by":"crossref","unstructured":"Zhang, X., Oh, S. and Sandhu, R. Access control models and mechanisms: PBDM: A Flexible Delegation Model in RBAC. Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies. pp.149\u2013157. New York: ACM.","DOI":"10.1145\/775412.775431"}],"container-title":["International Journal of Computer Integrated Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09511920802209041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T23:33:52Z","timestamp":1738884832000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09511920802209041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["10.1080\/09511920802209041"],"URL":"https:\/\/doi.org\/10.1080\/09511920802209041","relation":{},"ISSN":["0951-192X","1362-3052"],"issn-type":[{"type":"print","value":"0951-192X"},{"type":"electronic","value":"1362-3052"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}