{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:54:13Z","timestamp":1755035653538,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1145\/1063979.1063991","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"59-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["A fine-grained, controllable, user-to-user delegation method in RBAC"],"prefix":"10.1145","author":[{"given":"Jacques","family":"Wainer","sequence":"first","affiliation":[{"name":"State University of Campinas, Campinas, Brazil"}]},{"given":"Akhil","family":"Kumar","sequence":"additional","affiliation":[{"name":"Penn State University, University Park, PA"}]}],"member":"320","published-online":{"date-parts":[[2005,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504912"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581276"},{"key":"e_1_3_2_1_3_1","volume-title":"16th Annual Computer Security Applications Conference","author":"Ezedin","year":"2000","unstructured":"Ezedin S. Barka and Ravi Sandhu. Framework for role-based delegation models . In 16th Annual Computer Security Applications Conference , December 2000 . http:\/\/www.acsac.org\/2000\/abstracts\/34.html. Ezedin S. Barka and Ravi Sandhu. Framework for role-based delegation models. In 16th Annual Computer Security Applications Conference, December 2000. http:\/\/www.acsac.org\/2000\/abstracts\/34.html."},{"key":"e_1_3_2_1_4_1","volume-title":"23rd National Information Systems Security Conference","author":"Ezedin","year":"2000","unstructured":"Ezedin S. Barka and Ravi Sandhu. A role-based delegation model and some extensions . In 23rd National Information Systems Security Conference , October 2000 . http:\/\/csrc.nist.gov\/nissc\/2000\/proceedings\/papers\/021.pdf. Ezedin S. Barka and Ravi Sandhu. A role-based delegation model and some extensions. In 23rd National Information Systems Security Conference, October 2000. http:\/\/csrc.nist.gov\/nissc\/2000\/proceedings\/papers\/021.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/502807.502810"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/320263.320288"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286898"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/320473.320482"},{"key":"e_1_3_2_1_9_1","first-page":"44","volume-title":"CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations","author":"Hagstrom Asa","unstructured":"Asa Hagstrom , Sushil Jajodia , Francesco Parisi-Presicce , and Duminda Wijesekera . Revocations - a classification. In CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations , page 44 . IEEE Computer Society, 2001. Asa Hagstrom, Sushil Jajodia, Francesco Parisi-Presicce, and Duminda Wijesekera. Revocations - a classification. In CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations, page 44. IEEE Computer Society, 2001."},{"key":"e_1_3_2_1_10_1","first-page":"294","volume-title":"Proceedings of the International Conference on Security and Management, SAM '03","author":"Park JongSoon","year":"2003","unstructured":"JongSoon Park , YoungLok Lee , HyungHyo Lee , and BongNam Noh . A role-based delegation model using role hierarchy supporting restricted permission inheritance . In Proceedings of the International Conference on Security and Management, SAM '03 , pages 294 -- 302 . CSREA Press , 2003 . JongSoon Park, YoungLok Lee, HyungHyo Lee, and BongNam Noh. A role-based delegation model using role hierarchy supporting restricted permission inheritance. In Proceedings of the International Conference on Security and Management, SAM '03, pages 294--302. CSREA Press, 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646039.678331"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_13_1","volume-title":"Annual Computer Security Applications Conference","author":"Sandhu Ravi","year":"1999","unstructured":"Ravi Sandhu and Qamar Munawer . The ARBAC99 model for administration of roles . In Annual Computer Security Applications Conference , 1999 . Ravi Sandhu and Qamar Munawer. The ARBAC99 model for administration of roles. In Annual Computer Security Applications Conference, 1999."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990061"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843003000814"},{"key":"e_1_3_2_1_16_1","volume-title":"First International Conference, iTrust","volume":"2692","author":"Yao Walt","year":"2003","unstructured":"Walt Yao . Fidelis : A policy-driven trust management framework. In Trust Management , First International Conference, iTrust , volume 2692 of Lecture Notes in Computer Science, pages 301--317. Springer , 2003 . Walt Yao. Fidelis: A policy-driven trust management framework. In Trust Management, First International Conference, iTrust, volume 2692 of Lecture Notes in Computer Science, pages 301--317. Springer, 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937530"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775431"}],"event":{"name":"SACMAT05: 10th ACM Symposium on Access Control Models and Technologies 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Stockholm Sweden","acronym":"SACMAT05"},"container-title":["Proceedings of the tenth ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1063991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1063979.1063991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:12Z","timestamp":1750263552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1063991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":18,"alternative-id":["10.1145\/1063979.1063991","10.1145\/1063979"],"URL":"https:\/\/doi.org\/10.1145\/1063979.1063991","relation":{},"subject":[],"published":{"date-parts":[[2005,6]]},"assertion":[{"value":"2005-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}