{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:56:25Z","timestamp":1729659385417,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754925","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000061-000066","source":"Crossref","is-referenced-by-count":3,"title":["Role-Based Access Control modeling and validation"],"prefix":"10.1109","author":[{"given":"Ramzi A.","family":"Haraty","sequence":"first","affiliation":[]},{"given":"Mirna","family":"Naous","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/298151.298250"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/326619.326781"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37899-7_1"},{"journal-title":"Integrity Considerations for Secure Computer Systems","year":"1977","author":"biba","key":"15"},{"key":"16","article-title":"Non-discretionary controls for commercial applications","author":"lipner","year":"1982","journal-title":"Proceedings of the IEEE Symposium on Security & Privacy"},{"key":"13","article-title":"Modeling and validating confidentiality, integrity, and object oriented policies using Alloy","author":"haraty","year":"2013","journal-title":"Security and Privacy Preserving in Social Networks"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1375696.1375703"},{"key":"12","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.adhoc.2006.05.008","article-title":"Implementation of security policy for Clinical Information Systems over wireless sensor networks","volume":"5","author":"misic","year":"2006","journal-title":"Ad Hoc Networks Journal"},{"journal-title":"Tutorial for Alloy Analyzer 4 0","year":"0","author":"seater","key":"3"},{"journal-title":"Alloy 3 0 Reference Manual","year":"0","author":"jackson","key":"2"},{"key":"10","first-page":"17","article-title":"Validating access control policies with Alloy","author":"hassan","year":"2005","journal-title":"Proceedings of the Workshop on Practice and Theory of Access Control Technologies"},{"journal-title":"Computer Security Threats and Safeguards","year":"1997","author":"summers","key":"1"},{"key":"7","article-title":"Role-based access control","author":"ferraiolo","year":"1992","journal-title":"Proceedings of the 15th National Computer Security Conference"},{"key":"6","volume":"1","author":"bell","year":"1976","journal-title":"Secure Computer Systems Mathematical Foundations"},{"journal-title":"Detecting Inconsistencies of Mixed Secrecy Models and Business Policies","year":"2009","author":"hassan","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"9","article-title":"RBAC schema verification using lightweight formal model and constraint analysis","author":"zao","year":"2003","journal-title":"Proc of the 10th ACM Symposium on Access Control Models and Technologies"},{"key":"8","first-page":"126","article-title":"Separation of concerns for security","author":"viega","year":"2000","journal-title":"Proceedings of the Workshop on MultiDimensional Separation of Concerns in Software Engineering"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754925.pdf?arnumber=6754925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:22Z","timestamp":1498108522000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754925\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754925","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}