{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:33:20Z","timestamp":1769042000576,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cns.2013.6682761","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:48:17Z","timestamp":1387327697000},"page":"462-469","source":"Crossref","is-referenced-by-count":26,"title":["A framework for risk-aware role based access control"],"prefix":"10.1109","author":[{"given":"Khalid Zaman","family":"Bijon","sequence":"first","affiliation":[]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Horizontal integration: Broader access models for realizing information dominance","year":"2004","journal-title":"Technical Report JSR-04-132 MITRE Corporation"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63851"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"18","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1145\/1755688.1755719","article-title":"Risk-based access control systems built on fuzzy inferences","author":"ni","year":"2010","journal-title":"ASIACCS'10"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596811"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.41"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133622"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319175"},{"key":"14","article-title":"A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC","author":"jin","year":"2012","journal-title":"DBSec"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.1988.113349"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250468"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.11"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2012.6261086"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"key":"10","first-page":"241","article-title":"Role-based access control (RBAC): Features and motivations","author":"ferraiolo","year":"1995","journal-title":"1th Annual Computer Security Application Conference"},{"key":"7","first-page":"3","article-title":"XACML and risk-aware access control","volume":"2","author":"chen","year":"2013","journal-title":"Resource"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29963-6_11"},{"key":"5","article-title":"Towards an attribute based constraints specfication language","author":"bijon","year":"2013","journal-title":"Privacy Security Risk and Trust (PASSAT) 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35130-3_5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"8","first-page":"222","article-title":"Fuzzy multi-level security: An experiment on quantified risk-adaptive access control","author":"pau-chen","year":"2007","journal-title":"Security and Privacy 2007"}],"event":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","location":"National Harbor, MD, USA","start":{"date-parts":[[2013,10,14]]},"end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6675898\/6682673\/06682761.pdf?arnumber=6682761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:34:51Z","timestamp":1602686091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6682761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cns.2013.6682761","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}