{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:51Z","timestamp":1759092231058,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/tifs.2017.2771492","type":"journal-article","created":{"date-parts":[[2017,11,8]],"date-time":"2017-11-08T19:14:45Z","timestamp":1510168485000},"page":"897-911","source":"Crossref","is-referenced-by-count":31,"title":["Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control"],"prefix":"10.1109","volume":"13","author":[{"given":"Sadhana","family":"Jha","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7420-6947","authenticated-orcid":false,"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70225"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/1187441.1187442","article-title":"Security analysis in role-based access control","volume":"9","author":"ninghui","year":"2006","journal-title":"ACM Trans Inf Syst Secur"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315300"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.22"},{"journal-title":"Introduction to Algorithms","year":"2009","author":"cormen","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517891"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.022"},{"journal-title":"Algebraic Complexity Theory","year":"2013","author":"b\u00fcrgisser","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511752506"},{"key":"ref12","first-page":"89","author":"gomes","year":"2008","journal-title":"JeruSAT Satisfiability Solver"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1996.0016"},{"key":"ref14","first-page":"203","article-title":"Using CSP look-back techniques to solve real-world SAT instances","author":"bayardo","year":"1997","journal-title":"Proc Conf Innov Appl Artif Intell"},{"journal-title":"Datasets for Policy Mining","year":"2016","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2015.38"},{"key":"ref17","first-page":"1118","article-title":"Access control model based on role and attribute and its applications on space-ground integration networks","author":"qi","year":"2015","journal-title":"Proc 4th Int Conf Comput Sci Netw Technol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_8"},{"key":"ref19","first-page":"187","article-title":"HGABAC: Towards a formal model of hierarchical attribute-based access control","author":"servos","year":"2014","journal-title":"Proc Int Symp Found Pract Secur"},{"key":"ref28","first-page":"131","article-title":"Constraints specification in attribute based access control","volume":"2","author":"zaman","year":"2013","journal-title":"Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-162"},{"key":"ref27","first-page":"108","article-title":"Towards an attribute based constraints specification language","author":"zaman","year":"2013","journal-title":"Proc IEEE Computer Soc Conf"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"ref29","first-page":"226","article-title":"Attribute based access control constraint based on subject similarity","author":"nurmamat","year":"2014","journal-title":"Proc IEEE Workshop Adv Res Technol Ind Appl"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26961-0_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1237500.1237501"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266751"},{"journal-title":"Fundamentals of Domination in Graphs","year":"1998","author":"haynes","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCT.2014.6884907"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875495"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875498"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369048"},{"key":"ref23","first-page":"1","article-title":"Mining attribute-based access control policies from RBAC policies","author":"xu","year":"2013","journal-title":"Proc 10th Int Conf Expo Emerg Technol Smarter World"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875497"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15934-8_24"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8245900\/08101537.pdf?arnumber=8101537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:23:14Z","timestamp":1642004594000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8101537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":36,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2771492","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}