{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:04:42Z","timestamp":1725473082938},"reference-count":13,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231407","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"196-201","source":"Crossref","is-referenced-by-count":0,"title":["Policy storage for role-based access control systems"],"prefix":"10.1109","author":[{"given":"A.","family":"Belokosztolszki","sequence":"first","affiliation":[]},{"given":"D.M.","family":"Eyers","sequence":"additional","affiliation":[]},{"family":"Wei Wang","sequence":"additional","affiliation":[]},{"given":"K.","family":"Moody","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"T P G D Group","article-title":"PostgreSQL 7.3 Programmer's Guide","year":"0","key":"ref10"},{"key":"ref11","first-page":"37","article-title":"Access rights administration in role-based security systems","author":"nyanchama","year":"1994","journal-title":"IFIP Workshop on Database Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266752"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011298"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206964"},{"key":"ref6","first-page":"18","article-title":"The ponder policy specification language","author":"damianou","year":"2001","journal-title":"Policies for Distributed Systems and Networks International Workshop POLICY 2001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/507729.507732"},{"key":"ref8","first-page":"ii-33","article-title":"Role-based access control: a natural approach","author":"giuri","year":"1995","journal-title":"Proceedings of the First ACM Workshop on Role-Based Access Control"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300834"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35697-6_1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581276"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286898"}],"event":{"name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","acronym":"ENABL-03","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231407.pdf?arnumber=1231407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T20:22:20Z","timestamp":1489436540000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231407","relation":{},"subject":[]}}