{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:41:41Z","timestamp":1729647701112,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/saci.2016.7507343","type":"proceedings-article","created":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T00:28:06Z","timestamp":1470961686000},"page":"75-80","source":"Crossref","is-referenced-by-count":11,"title":["Security sandbox based on RBAC model"],"prefix":"10.1109","author":[{"given":"Jan","family":"Hurtuk","sequence":"first","affiliation":[]},{"given":"Anton","family":"Balaz","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Adam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2478\/v10198-011-0041-8"},{"key":"ref11","first-page":"5","article-title":"anomaly and misuse intrusions variability detection","volume":"10 4","author":"vokorokos","year":"2010","journal-title":"Acta Electrotechnica et Informatica"},{"key":"ref12","first-page":"20","article-title":"Architecture of multi-core computer with data driven computation model","volume":"10 4","author":"vokorokos","year":"2010","journal-title":"Acta Electrotechnica et Informatica"},{"key":"ref13","first-page":"2","article-title":"Configuring the SELinux policy","author":"smalley","year":"2002","journal-title":"NAI Labs Report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2478\/v10198-011-0034-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2478\/s13537-014-0214-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.15546\/aeei-2015-0028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.15546\/aeei-2014-0017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/wics.106"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSEM.2011.6081180"},{"key":"ref6","article-title":"Fine-Grained Access Control Model Based on RBAC. Control","author":"zhong","year":"2011","journal-title":"Automation and Systems Engineering (CASE) 2011 International Conference on"},{"key":"ref5","article-title":"Role-based access controls","author":"ferraiolo","year":"2009","journal-title":"arXiv preprint arXiv 0903 2171"},{"key":"ref8","first-page":"4","article-title":"Events planning in intrusion detection systems","author":"vokorokos","year":"2007","journal-title":"Acta Electrotechnica et Informatica"},{"key":"ref7","article-title":"A Meta-level Access Control Model for Adapting Diverse Access Control Policies on OS Environment. Security Technology","author":"park","year":"2008","journal-title":"2008 SECTECH'08 International Conference on IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECT.2012.217"},{"key":"ref1","article-title":"Role-based access control","author":"ferraiolo","year":"2003","journal-title":"Artech House"},{"key":"ref9","first-page":"1","article-title":"Intrusion detection system using self organizing map","volume":"6 1","author":"vokorokos","year":"2006","journal-title":"Acta Electrotechnica et Informatica"}],"event":{"name":"2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2016,5,12]]},"location":"Timisoara, Romania","end":{"date-parts":[[2016,5,14]]}},"container-title":["2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7503033\/7507333\/07507343.pdf?arnumber=7507343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T19:56:38Z","timestamp":1474660598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7507343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/saci.2016.7507343","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}