{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:11Z","timestamp":1755838391445,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/iscc.2014.6912546","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:27:42Z","timestamp":1412094462000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Role-Based Access control mechanisms"],"prefix":"10.1109","author":[{"given":"Oscar Mortagua","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Diogo Domingues","family":"Regateiro","sequence":"additional","affiliation":[]},{"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","volume":"15","author":"jayaraman","year":"2013","journal-title":"MOHAWK Abstraction-Refinement and Bound-Estimation"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266875"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943530"},{"journal-title":"RMI Remote Method Invocation","year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_9"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.01.004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809858"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.002"},{"key":"12","first-page":"1","article-title":"Static checking of dynamically-varying security policies in database-backed applications","author":"chlipala","year":"2010","journal-title":"USENIX Operating Systems Design and Implementation"},{"key":"21","first-page":"387","article-title":"ACADA-access control-driven architecture with dynamic adaptation","author":"pereira","year":"2012","journal-title":"SEKE'12-24th Intl Conf on Software Engineering and Knowledge Engineering"},{"key":"20","volume":"1","author":"wallach","year":"1998","journal-title":"S AFKASI 1 A Security Mechanism for Language-based Systems"},{"key":"22","first-page":"1","article-title":"Runtime values driven by access control policies statically enforced at the level of the relational business tiers","author":"pereira","year":"2013","journal-title":"SEKE'13-Intl Conf on Software Engineering and Knowledge Engineering"},{"key":"23","first-page":"158","volume":"4","author":"pereira","year":"2011","journal-title":"CRUD-DOM A Model for Bridging the Gap between the Object-oriented and the Relational Paradigms An Enhanced Performance Assessment Based on A Case Study"},{"key":"24","first-page":"158","article-title":"CRUD-DOM: A model for bridging the gap between the object-oriented and the relational paradigms-an enhanced performance assessment based on a case study","volume":"4","author":"pereira","year":"2011","journal-title":"Int J Adv Software"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19718-5_8"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-48533-1_1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"1","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","article-title":"Access control: Policies, models, and mechanisms","volume":"2171","author":"samarati","year":"2001","journal-title":"Found Secur Anal Des"},{"key":"7","first-page":"706","article-title":"LINQ: Reconciling object, relations and XML in the.NET framework","author":"erik","year":"2006","journal-title":"ACM SIGMOD Intl Conf on Management of Data"},{"key":"6","first-page":"1070","article-title":"ADO.NET entity framework: Raising the level of abstraction in data programming","author":"pablo","year":"2007","journal-title":"ACM SIGMOD International Conference on Management of Data"},{"journal-title":"JDBC Recipes A Problem-Solution Approach","year":"2005","author":"parsian","key":"5"},{"journal-title":"Microsoft\ufffd Open Database Connectivity","year":"1992","key":"4"},{"key":"9","article-title":"Object\/relational mapping 2008: Hibernate and the entity data model (edm)","author":"elizabeth","year":"2008","journal-title":"Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data"},{"journal-title":"Java Persistence with JPA","year":"2010","author":"yang","key":"8"}],"event":{"name":"2014 IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2014,6,23]]},"location":"Funchal, Madeira, Portugal","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6892194\/6912451\/06912546.pdf?arnumber=6912546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:31:24Z","timestamp":1498152684000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscc.2014.6912546","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}