{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T18:23:51Z","timestamp":1757701431169,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/icdim.2012.6360119","type":"proceedings-article","created":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T02:16:48Z","timestamp":1354328208000},"page":"22-29","source":"Crossref","is-referenced-by-count":2,"title":["On formalizing of inconsistency and semi-consistency in spatio-temporal access control"],"prefix":"10.1109","author":[{"given":"Emsaieb","family":"Geepalla","sequence":"first","affiliation":[]},{"given":"Behzad","family":"Bordbar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626220"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11811-1_13"},{"journal-title":"Role based access control","year":"2007","author":"ferraiolo","key":"11"},{"key":"12","first-page":"351","article-title":"SiTra: Simple Transformations in Java","volume":"4199","author":"akehurst","year":"2006","journal-title":"LNCS"},{"journal-title":"A Framework for Specification and Verification of Generalized Spatio-Temporal Role Based Access Control Model","year":"2007","author":"samuel","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85735-8_6"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2009.726.734"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73538-0_16","article-title":"A Spatio-temporal Role-Based Access Control Model","author":"ray","year":"2007","journal-title":"Proceedings of the 21st Annual IFIPWG11 3Working Conference on Data and Applications Security"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1145\/1368310.1368341","article-title":"On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control","author":"chen","year":"2008","journal-title":"Proceedings of the 2008 ACM symposium on Information computer and communications security"},{"journal-title":"MDA Model driven architecture","year":"2005","key":"6"},{"journal-title":"Software Abstractions Logic Language and Analysis","year":"2006","author":"jackson","key":"5"},{"key":"4","article-title":"On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model","author":"toahchoodee","year":"2008","journal-title":"Proceedings of the 22nd Annual IFIP WG 11 3 Working Conference on Data and Applications Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.8.912-920"},{"journal-title":"RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis","year":"2002","author":"zao","key":"8"}],"event":{"name":"2012 Seventh International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2012,8,22]]},"location":"Macau, Macao","end":{"date-parts":[[2012,8,24]]}},"container-title":["Seventh International Conference on Digital Information Management (ICDIM 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6341280\/6360086\/06360119.pdf?arnumber=6360119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T20:04:26Z","timestamp":1643745866000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6360119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icdim.2012.6360119","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}