{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:10:20Z","timestamp":1745986220711,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/colcom.2007.4553805","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T14:35:25Z","timestamp":1215095725000},"page":"25-32","source":"Crossref","is-referenced-by-count":5,"title":["A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies"],"prefix":"10.1109","author":[{"family":"Yue Zhang","sequence":"first","affiliation":[]},{"given":"James. B. D.","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Formal Foundations for Hybrid Role Hierarchy","author":"joshi","year":"0","journal-title":"ACM Transactions on Information and Svstem Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319186"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.158"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"key":"ref15","article-title":"Canonical Security Modeling for Federated Databases","volume":"a 25","author":"pernul","year":"1992","journal-title":"IFIP Transactions"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286891"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.185"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WORDS.2005.18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133090"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.481533"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286902"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3858-7_17"},{"key":"ref7","article-title":"Role-based access control: A natural approach","author":"guiri","year":"1997","journal-title":"Proceedings of the 1st ACM Workshop on Role-based Access Control"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008787317852"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507724"}],"event":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","start":{"date-parts":[[2007,11,12]]},"location":"New York, NY, USA","end":{"date-parts":[[2007,11,15]]}},"container-title":["2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543894\/4553792\/04553805.pdf?arnumber=4553805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T23:18:40Z","timestamp":1489706320000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4553805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/colcom.2007.4553805","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}