{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:25:05Z","timestamp":1729664705797,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275915","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"2027-2032","source":"Crossref","is-referenced-by-count":8,"title":["Inter-domain role based access control using ontology"],"prefix":"10.1109","author":[{"given":"S. Chandra","family":"Mouliswaran","sequence":"first","affiliation":[]},{"given":"Ch. Aswani","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"C.","family":"Chandrasekar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/501978.501979","article-title":"A temporal role-based access control model","volume":"4","author":"elisa","year":"2001","journal-title":"ACM Trans Inf Syst Secur"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843003000814"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.589"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11836025_19"},{"key":"ref15","first-page":"811","article-title":"Modeling Chinese wall access control using formal concept analysis. In Contemporary Computing and Informatics (IC3I)","author":"chandra","year":"2014","journal-title":"2014 IEEE International Conference on"},{"key":"ref16","first-page":"794","article-title":"Representation of Multiple Domain Role Based Access Control Using FCA","author":"chandra","year":"2015","journal-title":"2015 IEEE International Conference on Electrical Computer and Communication Technologies"},{"key":"ref17","first-page":"19","article-title":"CPBAC: Property based access control model for secure cooperation in online social networks","volume":"4","author":"youna","year":"2014","journal-title":"Computer and Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2008.02.015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.185"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15918-3_7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377849"},{"key":"ref5","first-page":"543","article-title":"Using Semantic Web Technologies to Specify Constraints of RBAC","author":"wu","year":"2005","journal-title":"PDCAT"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.10.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2007.12.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.09.018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.53"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0980-1"},{"year":"0","key":"ref20"},{"article-title":"A practical guide to building OWL ontologies using Protege 4 and CO-ODE Tools","year":"2009","author":"horridge","key":"ref21"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275915.pdf?arnumber=7275915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:23:26Z","timestamp":1498235006000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275915","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}