{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:00:47Z","timestamp":1730203247168,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664411","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T16:48:02Z","timestamp":1385570882000},"page":"274-278","source":"Crossref","is-referenced-by-count":0,"title":["Design of dynamic fine-grained role-based access control strategy"],"prefix":"10.1109","author":[{"given":"Wenfang","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"211","article-title":"A role manage method based on rbac","volume":"49","author":"fan","year":"2012","journal-title":"Journal of Computer research and development"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.9"},{"key":"7","first-page":"677","article-title":"Enhancing role management in role-based access control","author":"feng","year":"2010","journal-title":"Proc of IC-BNMT10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"5","first-page":"28","article-title":"Research on dynamic and fine-grained access control based on trusted domain","author":"wan","year":"2011","journal-title":"Applications of Software Computation"},{"key":"4","first-page":"32","article-title":"An access control policy multi-tenancy cloud storage platform","author":"shen","year":"2011","journal-title":"Journal of Chinese Computer Systems"},{"key":"8","first-page":"87","article-title":"Application of fine-grained core rbac model in privilege management of electronic power erp","author":"tian","year":"2010","journal-title":"Proc of APYCCT10"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664354\/06664411.pdf?arnumber=6664411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:33:42Z","timestamp":1490222022000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/ccis.2012.6664411","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}