{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:18:50Z","timestamp":1771042730175,"version":"3.50.1"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596057","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"221-228","source":"Crossref","is-referenced-by-count":7,"title":["Policy templates for relationship-based access control"],"prefix":"10.1109","author":[{"given":"Evangelos","family":"Aktoudianakis","sequence":"first","affiliation":[]},{"given":"Jason","family":"Crampton","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Helen","family":"Treharne","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Waller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.003"},{"key":"2","first-page":"177","article-title":"A semantic web based framework for social network access control","author":"barbara","year":"2009","journal-title":"SACMAT"},{"key":"1","first-page":"117","author":"glenn","year":"2012","journal-title":"Relationship-based Access Control Its Expression and Enforcement Through Hybrid Logic"},{"key":"7","first-page":"303","article-title":"A privacy preservation model for facebook-style social network systems","author":"philip","year":"2009","journal-title":"ESORICS"},{"key":"6","first-page":"191","article-title":"Relationship-based access control: Protection model and policy language","author":"philip","year":"2011","journal-title":"CODASPY"},{"key":"5","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/978-3-642-31540-4_2","article-title":"A user-to-user relationship-based access control model for online social networks","volume":"7371","author":"yuan","year":"2012","journal-title":"Lecture Notes in Computer Science"},{"key":"4","article-title":"Enforcing access control in web-based social networks","volume":"13","author":"barbara","year":"2009","journal-title":"ACM Trans Inf Syst Secur"},{"key":"8","first-page":"51","article-title":"Relationship-based access control policies and their policy languages","author":"philip","year":"2011","journal-title":"SACMAT"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","location":"Tarragona, Spain","start":{"date-parts":[[2013,7,10]]},"end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596057.pdf?arnumber=6596057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:11:26Z","timestamp":1498083086000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596057","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}