{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:11:52Z","timestamp":1725675112217},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/icnss.2011.6060001","type":"proceedings-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T16:59:24Z","timestamp":1320166764000},"page":"200-207","source":"Crossref","is-referenced-by-count":6,"title":["A secure, constraint-aware role-based access control interoperation framework"],"prefix":"10.1109","author":[{"given":"Nathalie","family":"Baracaldo","sequence":"first","affiliation":[]},{"given":"Amirreza","family":"Masoumzadeh","sequence":"additional","affiliation":[]},{"given":"James","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266749"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1237500.1237501"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.PERVASIVEHEALTH2008.2504"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WORDS.2005.18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286891"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.185"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NPC.2007.33"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542213"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133090"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507724"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133071"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266866"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1401"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377850"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COLCOM.2007.4553805"}],"event":{"name":"2011 5th International Conference on Network and System Security (NSS)","start":{"date-parts":[[2011,9,6]]},"location":"Milan, Italy","end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 5th International Conference on Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6044613\/6059944\/06060001.pdf?arnumber=6060001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:18:38Z","timestamp":1490095118000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6060001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnss.2011.6060001","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}