{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:00:44Z","timestamp":1729616444242,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/dictap.2012.6215380","type":"proceedings-article","created":{"date-parts":[[2012,6,21]],"date-time":"2012-06-21T12:17:03Z","timestamp":1340281023000},"page":"230-235","source":"Crossref","is-referenced-by-count":1,"title":["Specification of role and attribute transitions for secure information system access"],"prefix":"10.1109","author":[{"given":"Mark","family":"Evered","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Prunes: An efficient and complete strategy for automated trust negotiation over the internet","author":"yu","year":"2000","journal-title":"Proc 7th ACM Conference on Computer and Communications Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373294"},{"key":"16","article-title":"Lessons learned from the practice of mobile health application development","author":"yu","year":"0","journal-title":"Proc 28th Annual International Computer Software and Applications Conference Hong Kong 2004"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286891"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133081"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/800009.808059"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"3","article-title":"Generalized role-based access control for securing future applications","author":"covington","year":"0","journal-title":"Proc 23rd National Information Systems Security Conference Baltimore 2000"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2003.11.018"},{"journal-title":"Secure Computer Systems Unified Exposition and Multics Interpretation","year":"1975","author":"bell","key":"1"},{"journal-title":"Object constraint language specification","year":"2006","key":"10"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45559-0_6","article-title":"An architecture for distributed OASIS services","volume":"1795","author":"hine","year":"2000","journal-title":"Proc Middleware 2000 Lecture Notes in Computer Science"},{"key":"6","article-title":"A case study in access control requirements for a health information system","author":"evered","year":"0","journal-title":"Proc Australasian Information Security Workshop Dunedin 2004"},{"key":"5","article-title":"Opsis: A distributed object architecture based on bracket capabilities","author":"evered","year":"0","journal-title":"Proc Conference on Technology of Object-Oriented Languages and Systems Sydney 2002"},{"key":"4","article-title":"Ponder: A language for specifying security and management policies for distributed systems","author":"damianou","year":"2000","journal-title":"Language Specification"},{"journal-title":"Extensible Access Control Markup Language (XACML)","year":"2005","author":"moses","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/359488.359493"}],"event":{"name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","start":{"date-parts":[[2012,5,16]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2012,5,18]]}},"container-title":["2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209061\/6215333\/06215380.pdf?arnumber=6215380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:22:14Z","timestamp":1497990134000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6215380\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/dictap.2012.6215380","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}