{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:22:39Z","timestamp":1725654159881},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/cscwd.2007.4281428","type":"proceedings-article","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T15:59:31Z","timestamp":1186588771000},"page":"162-167","source":"Crossref","is-referenced-by-count":1,"title":["Active Authorization Management for Multi-domain Cooperation"],"prefix":"10.1109","author":[{"given":"Yuqing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Bin","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Xiangxu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Zongkai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990042"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.185"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990063"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063982"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1145\/1089551.1089668","article-title":"PRES&#x2014;A Practical Flexible RBAC Workflow System","author":"sun","year":"2005","journal-title":"Proceeding of the 7th International Conference on Electronic Commerce"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1145\/775412.775430","article-title":"Induced Role Hierarchies with Attribute-Based RBAC","author":"ai-kahtani","year":"2003","journal-title":"Proc ACM SACMAT"},{"key":"ref3","first-page":"353","article-title":"A Model for Attribute-Based User-Role Assignment","author":"ai-kahtani","year":"0","journal-title":"Proc 18th Annual Computer Security App Conf"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581276"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775414"},{"key":"ref7","article-title":"Trustworthiness based authorization on WWW","author":"zhong","year":"2001","journal-title":"IEEE workshop on Security in Distributed Data Warehousing New Orlean"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_19"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"ref9","first-page":"333","article-title":"Advanced Features for Enterprise-Wide Role-Based Access Control","author":"kern","year":"2002","journal-title":"In Proceedings of the 18th Annual Computer Security Applications Conference"}],"event":{"name":"2007 11th International Conference on Computer Supported Cooperative Work in Design","start":{"date-parts":[[2007,4,26]]},"location":"Melbourne, Australia","end":{"date-parts":[[2007,4,28]]}},"container-title":["2007 11th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4281389\/4281390\/04281428.pdf?arnumber=4281428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T18:32:35Z","timestamp":1684002755000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4281428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2007.4281428","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}