{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:19:49Z","timestamp":1729671589757,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/iske.2010.5680841","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T14:05:57Z","timestamp":1294409157000},"page":"426-429","source":"Crossref","is-referenced-by-count":3,"title":["Web service access control with semantic interoperation"],"prefix":"10.1109","author":[{"family":"Yi Zhao","sequence":"first","affiliation":[]},{"family":"Zhong Li","sequence":"additional","affiliation":[]},{"given":"Wolfgang A.","family":"Halang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133091"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.127"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266877"},{"journal-title":"WordNet An Electronic Lexical Database","year":"1999","author":"fellbaum","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCA.2008.4783596"},{"year":"2005","author":"moses","key":"ref15"},{"key":"ref4","article-title":"SBAC: A Semantic-based AccessControl Model","author":"javanmardi","year":"2006","journal-title":"The 11th Nordic Workshop on Secure IT-systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8128-6_16"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","article-title":"Access Control: Policies, Models, and Mechanisms","volume":"2171","author":"samarati","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"ref5","first-page":"114","article-title":"Enhanced Access Control with Semantic Context Hierarchy Tree for Ubiquitous Computing","volume":"8","author":"ko","year":"2008","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342877"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2004.29"},{"key":"ref1","first-page":"28","author":"berners-lee","year":"2001","journal-title":"The Semantic Web"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"}],"event":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","start":{"date-parts":[[2010,11,15]]},"location":"Hangzhou, China","end":{"date-parts":[[2010,11,16]]}},"container-title":["2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5676709\/5680739\/05680841.pdf?arnumber=5680841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T18:08:39Z","timestamp":1497895719000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5680841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iske.2010.5680841","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}