{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:08:40Z","timestamp":1763467720183,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,1,9]],"date-time":"2006-01-09T00:00:00Z","timestamp":1136764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,1,9]]},"DOI":"10.1145\/1111542.1111562","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"112-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Core role-based access control"],"prefix":"10.1145","author":[{"given":"Yanhong A.","family":"Liu","sequence":"first","affiliation":[{"name":"State University of New York at Stony Brook"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Michael","family":"Gorbovitski","sequence":"additional","affiliation":[{"name":"State University of New York at Stony Brook"}]},{"given":"Tom","family":"Rothamel","sequence":"additional","affiliation":[{"name":"State University of New York at Stony Brook"}]},{"given":"Yongxi","family":"Cheng","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Yingchao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2006,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"3","author":"American National Standards Institute","year":"2004","unstructured":"American National Standards Institute , Inc. Role-Based Access Control. ANSI INCITS 359-- 2004 . Approved Feb. 3 , 2004. American National Standards Institute, Inc. Role-Based Access Control. ANSI INCITS 359--2004. Approved Feb. 3, 2004.","journal-title":"Inc. Role-Based Access Control. ANSI INCITS 359--"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(95)00003-B"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0096-0551(75)90019-3"},{"key":"e_1_3_2_1_4_1","first-page":"554","volume-title":"Proceedings of the NIST-NSA National Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and R. Kuhn . Role-based access control . In Proceedings of the NIST-NSA National Computer Security Conference , pages 554 -- 563 , 1992 . D. Ferraiolo and R. Kuhn. Role-based access control. In Proceedings of the NIST-NSA National Computer Security Conference, pages 554--563, 1992."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/567752.567755"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/800168.811544"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286902"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/265779.265831"},{"key":"e_1_3_2_1_10_1","volume-title":"Z formal specification notation -- Syntax, type system and semantics. ISO\/IEC 13568","author":"International Organization for Standardization.","year":"2002","unstructured":"International Organization for Standardization. Z formal specification notation -- Syntax, type system and semantics. ISO\/IEC 13568 : 2002 . International Organization for Standardization. Z formal specification notation -- Syntax, type system and semantics. ISO\/IEC 13568:2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344302"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/989.991"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094848"},{"key":"e_1_3_2_1_15_1","unstructured":"National Institute of Standards and Technology. Role-Based Access Control. http:\/\/csrc.nist.gov\/rbac.  National Institute of Standards and Technology. Role-Based Access Control. http:\/\/csrc.nist.gov\/rbac."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512957"},{"key":"e_1_3_2_1_17_1","first-page":"171","volume-title":"H. Gallaire, J. Minker, and J.-M","author":"Paige R.","year":"1984","unstructured":"R. Paige . Applications of finite differencing to database integrity control and query\/transaction optimization . In H. Gallaire, J. Minker, and J.-M . Nicolas, editors, Advances in Database Theory, Vol. 2 , pages 171 -- 209 . Plenum Press . New York, Mar. 1984 . R. Paige. Applications of finite differencing to database integrity control and query\/transaction optimization. In H. Gallaire, J. Minker, and J.-M. Nicolas, editors, Advances in Database Theory, Vol. 2, pages 171--209. Plenum Press. New York, Mar. 1984."},{"key":"e_1_3_2_1_18_1","series-title":"LNCS","first-page":"36","volume-title":"Proceedings of the 3rd European Symposium on Programming","author":"Paige R.","year":"1990","unstructured":"R. Paige . Symbolic finite differencing---Part 1 . In N. D. Jones, editor, Proceedings of the 3rd European Symposium on Programming , volume 432 of LNCS , pages 36 -- 56 . Springer-Verlag , Berlin , 1990 . R. Paige. Symbolic finite differencing---Part 1. In N. D. Jones, editor, Proceedings of the 3rd European Symposium on Programming, volume 432 of LNCS, pages 36--56. Springer-Verlag, Berlin, 1990."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357177"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_2_1_21_1","volume-title":"The Z Notation: A Reference Manual","author":"Spivey J. M.","year":"1992","unstructured":"J. M. Spivey . The Z Notation: A Reference Manual . Prentice-Hall , 2 nd edition, 1992 . J. M. Spivey. The Z Notation: A Reference Manual. Prentice-Hall, 2nd edition, 1992.","edition":"2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/103135.103137"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11563952_54"}],"event":{"name":"PEPM06: Partial Evaluation and Program Manipulation 2006","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Charleston South Carolina","acronym":"PEPM06"},"container-title":["Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111542.1111562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1111542.1111562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:24Z","timestamp":1750262904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111542.1111562"}},"subtitle":["efficient implementations by transformations"],"short-title":[],"issued":{"date-parts":[[2006,1,9]]},"references-count":22,"alternative-id":["10.1145\/1111542.1111562","10.1145\/1111542"],"URL":"https:\/\/doi.org\/10.1145\/1111542.1111562","relation":{},"subject":[],"published":{"date-parts":[[2006,1,9]]},"assertion":[{"value":"2006-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}