{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:19:11Z","timestamp":1742386751942},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Comput."],"published-print":{"date-parts":[[2003,3]]},"DOI":"10.1109\/mic.2003.1189190","type":"journal-article","created":{"date-parts":[[2003,3,26]],"date-time":"2003-03-26T16:30:05Z","timestamp":1048696205000},"page":"62-69","source":"Crossref","is-referenced-by-count":136,"title":["Role-based access control with X.509 attribute certificates"],"prefix":"10.1109","volume":"7","author":[{"given":"D.W.","family":"Chadwick","sequence":"first","affiliation":[]},{"given":"A.","family":"Otenko","sequence":"additional","affiliation":[]},{"given":"E.","family":"Ball","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibw206215","article-title":"generic authorization and access control application program interface: c-bindings","author":"ryutov","year":"2000"},{"key":"bibw206213","year":"2000","journal-title":"Authorization (AZN) API"},{"key":"bibw206214","article-title":"generic authorization and access control application program interface c-bindings","author":"ryutov","year":"2000"},{"key":"bibw20622","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2704","article-title":"the keynote trust-management system version 2","author":"blaze","year":"1999"},{"key":"bibw20623","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"bibw20624","first-page":"67","article-title":"scalability issues in pmi delegation","author":"knight","year":"2002","journal-title":"Pre-Proc 1st Ann PKI Workshop"},{"key":"bibw20625","article-title":"an internet attribute certificate for authorization","author":"farrell","year":"2000"},{"key":"bibw206211","first-page":"39","article-title":"rbac policies in xml for x.509-based privilege management","author":"chadwick","year":"2002","journal-title":"Proc IFIP 17th Int l Conf Information Security"},{"key":"bibw206212","year":"1995","journal-title":"ITU-T Recommendation X 812 Security Frameworks for Open Systems Access Control Framework"},{"key":"bibw20621","year":"2000","journal-title":"ITU-T Recommendation X 509 The Directory Authentication Framework"},{"key":"bibw206210","year":"2002","journal-title":"Extensible Access Control Markup Language (XACML)"},{"key":"bibw20629","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950196"},{"key":"bibw20628","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373264"},{"key":"bibw20627","first-page":"18","article-title":"the ponder policy specification language","author":"damianou","year":"2001","journal-title":"Proc Policy 2001 Workshop on Policies for Distributed Systems and Networks"},{"key":"bibw20626","doi-asserted-by":"publisher","DOI":"10.1145\/383775.383777"}],"container-title":["IEEE Internet Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4236\/26665\/01189190.pdf?arnumber=1189190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:50:59Z","timestamp":1641988259000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1189190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,3]]}},"URL":"https:\/\/doi.org\/10.1109\/mic.2003.1189190","relation":{},"ISSN":["1089-7801"],"issn-type":[{"value":"1089-7801","type":"print"}],"subject":[],"published":{"date-parts":[[2003,3]]}}}