{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:59:32Z","timestamp":1725465572960},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1174463","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"9 pp.","source":"Crossref","is-referenced-by-count":1,"title":["Supporting parameterised roles with object-based access control"],"prefix":"10.1109","author":[{"given":"M.","family":"Evered","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Opsis: A Distributed Object Architecture Based on Bracket Capabilities","author":"evered","year":"2002","journal-title":"Proc Conference on Technology of Object-Oriented Languages and Systems Sydney"},{"key":"ref11","article-title":"Role Based Access Control: Features and Motivations","author":"ferraiolo","year":"1995","journal-title":"Proc 11th Annual Computer Security Applications Conference"},{"key":"ref12","article-title":"Merging Capabilities with the Object Model of an Object-Oriented Abstract Machine","author":"fond\u00f3n","year":"1998","journal-title":"12th European Conference on Object-Oriented Programming Brussels"},{"journal-title":"Design Patterns","year":"1995","author":"gamma","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266773"},{"journal-title":"The Java Language Specification","year":"1996","author":"gosling","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359224"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359488.359493"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44995-9_25"},{"key":"ref4","article-title":"A View-Based Access Control Model for CORBA","author":"brose","year":"1999","journal-title":"Secure Internet Programming Security Issues for Mobile and Distributed Objects LNCS 1603"},{"journal-title":"The Cambridge CAP Computer and Its Operating System","year":"1979","author":"wilkes","key":"ref27"},{"journal-title":"CORBA Security An Introduction to Safe Computing with Objects","year":"2000","author":"blakley","key":"ref3"},{"key":"ref6","article-title":"The COM+ Security Model Gets You Out of the Security Programming Business","author":"eddon","year":"1999","journal-title":"Microsoft Systems Journal"},{"key":"ref5","article-title":"Generalized Role-based Access Control for Securing Future Applications","author":"covington","year":"2000","journal-title":"Proc 23rd National Information Systems Security Conference Baltimore"},{"key":"ref8","article-title":"Type Operators for Role-based Object Security","author":"evered","year":"2001","journal-title":"3rd IFIP\/ACM IntI Conf on Distributed Systems Platforms - Middleware Heidelberg"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SWMT.2000.890430"},{"key":"ref2","article-title":"Secure Computer Systems: Mathematical Foundations","author":"bell","year":"1973","journal-title":"Technical Report ESD-TR-73-278"},{"key":"ref9","article-title":"Bracket Capabilities for Distributed Systems Security","author":"evered","year":"2002","journal-title":"Proc 25th Australasian Computer Science Conference Melbourne"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/29.1.1"},{"key":"ref20","article-title":"Persistent Protected Modules and Persistent Processes as the Base for a More Secure Operating System","author":"keedy","year":"1992","journal-title":"Proc 25th Hawaii Int l Conf on System Sciences"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/197530.197584"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266770"},{"key":"ref24","first-page":"4\/10","article-title":"The MONADS Architecture: Motivation and Implementation","author":"rosenberg","year":"1985","journal-title":"Proc First Pan Pacific Computer Conference"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/29.4.289"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/74877.74899"},{"journal-title":"Java Security Architecture","year":"0","key":"ref25"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","start":{"date-parts":[[2003,1,9]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01174463.pdf?arnumber=1174463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T23:06:46Z","timestamp":1489446406000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1174463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1174463","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}