{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:52:36Z","timestamp":1730224356526,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/grc.2006.1635919","type":"proceedings-article","created":{"date-parts":[[2006,6,8]],"date-time":"2006-06-08T05:25:23Z","timestamp":1149744323000},"page":"792-795","source":"Crossref","is-referenced-by-count":0,"title":["Expressing authorization in semantic web services"],"prefix":"10.1109","author":[{"given":"R.S.","family":"Patterson","sequence":"first","affiliation":[]},{"given":"J.A.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"eXtensible Access Control Markup Language (XACML)Version 2 0","year":"2005","author":"moses","key":"15"},{"year":"0","key":"13"},{"journal-title":"Proposed NIST Standard for Role-based Access Control","year":"0","author":"gavrila","key":"14"},{"journal-title":"Web Services Policy Framework (WS-Policy)","year":"0","author":"bajaj","key":"11"},{"journal-title":"Web Service Semantics - WSDL-S","year":"0","author":"akkiraju","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2004.23"},{"key":"2","article-title":"Rule-based and ontology-based policies: Toward a hybrid approach to control agents in pervasive environments","author":"toninelli","year":"2005","journal-title":"International Semantic Web Conference"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/11533733_4"},{"journal-title":"Web Services Architecture","year":"2004","author":"booth","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232091"},{"key":"6","article-title":"Semantic matching of web service policies","author":"verma","year":"2005","journal-title":"Third International Conference on Web Services (ICWS'05)"},{"journal-title":"Credential Based Access Control for Semantic Web Services","year":"0","author":"agarwal","key":"5"},{"key":"4","first-page":"71","article-title":"Authorization and access control of application data in workflow systems","volume":"18","author":"wu","year":"2002","journal-title":"Journal of Intelligent Information Systems Integrating Artificial Intelligence and Database Technologies (JUS)"},{"journal-title":"Specification Web Services Security (WS-Security)","year":"2002","author":"atkinson","key":"9"},{"key":"8","first-page":"395","article-title":"Adding semantics to web services standards","author":"sivashanmugam","year":"2003","journal-title":"Proceedings of the 1st International Conference on Web Services (ICWS'03)"}],"event":{"name":"2006 IEEE International Conference on Granular Computing","location":"Atlanta, GA, USA"},"container-title":["2006 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10898\/34297\/01635919.pdf?arnumber=1635919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T00:17:40Z","timestamp":1489537060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1635919\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/grc.2006.1635919","relation":{},"subject":[]}}