{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:25:31Z","timestamp":1725686731370},"reference-count":18,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231406","type":"proceedings-article","created":{"date-parts":[[2004,1,24]],"date-time":"2004-01-24T04:33:03Z","timestamp":1074918783000},"page":"190-195","source":"Crossref","is-referenced-by-count":3,"title":["Specification and verification of constraints in role based access control"],"prefix":"10.1109","author":[{"given":"G.","family":"Kolaczek","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/0167-4048(92)90131-A"},{"key":"ref11","first-page":"20","article-title":"Role hierarchies and constraints for lattice-based access controls","author":"sandhu","year":"1996","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref12","first-page":"32","article-title":"Rationale for the RBAC96 family of access control models","author":"sandhu","year":"1997","journal-title":"ACM Workshop on RBAC"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/286884.286891"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/266741.266752"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/300830.300839"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CSAC.1994.367293"},{"key":"ref17","article-title":"Request for Comments 2828","author":"shirey","year":"0","journal-title":"The Internet Society"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1093\/mind\/LX.237.1"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/270152.270177"},{"year":"1998","author":"bolc","article-title":"Reasoning in non-classical logic. Reasoning automation","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/266741.266761"},{"year":"1982","author":"denning","article-title":"Cryptography and Data Security","key":"ref5"},{"year":"1926","author":"mally","article-title":"Elemente der Logik des Willens","key":"ref8"},{"year":"2001","author":"ko?aczek","article-title":"Model of Role Based Access Control mechanism","key":"ref7"},{"year":"1995","author":"bolc","article-title":"Reasoning in non-classical logic. Theoretical basis","key":"ref2"},{"key":"ref1","first-page":"23","article-title":"Role based Access Control for the World Wide Web","author":"barkley","year":"1997","journal-title":"Proc NIST-NSA Computer Security Conf"},{"year":"0","journal-title":"National Computer Security Center","article-title":"NCSC, Trusted Computer Security Evaluation Criteria","key":"ref9"}],"event":{"acronym":"ENABL-03","name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231406.pdf?arnumber=1231406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T00:22:18Z","timestamp":1489450938000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231406","relation":{},"subject":[]}}