{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:03:07Z","timestamp":1730210587871,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/cscwd.2008.4536994","type":"proceedings-article","created":{"date-parts":[[2010,12,13]],"date-time":"2010-12-13T16:00:45Z","timestamp":1292256045000},"page":"277-282","source":"Crossref","is-referenced-by-count":0,"title":["Authorization approaches for advanced permission-role assignments"],"prefix":"10.1109","author":[{"family":"Hua Wang","sequence":"first","affiliation":[]},{"family":"Jianming Yong","sequence":"additional","affiliation":[]},{"family":"Jiuyong Li","sequence":"additional","affiliation":[]},{"family":"Min Peng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2003.819917"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373294"},{"key":"15","first-page":"167","article-title":"authorization algorithms for the mobility of user-role relationship","author":"wang","year":"2005","journal-title":"Proceedings of the 28th Australasian Computer Science Conference"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/B:ISFI.0000015873.35795.5e"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.35"},{"key":"14","first-page":"296","article-title":"anonymous access scheme for electronic-services","author":"wang","year":"2004","journal-title":"Proceedings of the Twenty-Seventh Australasian Computer Science Conference"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816032"},{"key":"12","article-title":"formal authorization allocation approaches for permission-role assignments using relational algebra operations","volume":"3","author":"wang","year":"0","journal-title":"Proceedings of the 14th Australian Database Conference ADC200"},{"key":"3","article-title":"final report: nist small business innovative research (sbir) grant: role based access control: phase 1","author":"feinstein","year":"1995","journal-title":"Technical Report"},{"key":"2","first-page":"107","article-title":"an examination of federal and commercial access control policy needs","author":"david","year":"1993","journal-title":"NIST NCSC National Computer Security Conference"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319177"},{"year":"0","key":"10"},{"key":"7","first-page":"139","article-title":"on the interaction between role-based access control and relational databases","author":"osborn","year":"1996","journal-title":"IFIP WG11 3 Tenth Annual Working Conference on Database Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300834"},{"key":"4","first-page":"554","article-title":"role based access control","author":"ferraiolo","year":"1992","journal-title":"The 15th National Computer Security Conference"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286891"},{"key":"8","first-page":"64","article-title":"rational for the rbac96 family of access control models","author":"sandhu","year":"1997","journal-title":"Proceedings of 1st ACM Workshop on Role-based Access Control"}],"event":{"name":"in Design (CSCWD)","start":{"date-parts":[[2008,4,16]]},"location":"Xian, China","end":{"date-parts":[[2008,4,18]]}},"container-title":["2008 12th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4530852\/4536938\/04536994.pdf?arnumber=4536994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T11:29:46Z","timestamp":1489663786000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4536994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2008.4536994","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}