{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:30:34Z","timestamp":1761323434173},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,21]]},"DOI":"10.1145\/1146238.1146253","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"121-132","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Role-Based access control consistency validation"],"prefix":"10.1145","author":[{"given":"Paolina","family":"Centonze","sequence":"first","affiliation":[{"name":"IBM T. J. Watson, Hawthorne, NY"}]},{"given":"Gleb","family":"Naumovich","sequence":"additional","affiliation":[{"name":"Polytechnic University, Brooklyn, NY"}]},{"given":"Stephen J.","family":"Fink","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson, Hawthorne, NY"}]},{"given":"Marco","family":"Pistoia","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2006,7,21]]},"reference":[{"key":"e_1_3_2_1_2_1","series-title":"Tagungsband der GI\/\u00d6CG Jahrestagung","first-page":"608","volume-title":"K. Bauknecht, W. Brauer, and Th","author":"Achim","year":"2001","unstructured":"Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML\/OCL . In K. Bauknecht, W. Brauer, and Th . M\u00fcck, editors, Proceedings of Informatik 2001 , volume 1 of Tagungsband der GI\/\u00d6CG Jahrestagung , pages 608 -- 614 , Vienna, Austria, November 2001. \u00d6sterreichische Computer Gesellschaft . Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML\/OCL. In K. Bauknecht, W. Brauer, and Th. M\u00fcck, editors, Proceedings of Informatik 2001, volume 1 of Tagungsband der GI\/\u00d6CG Jahrestagung, pages 608--614, Vienna, Austria, November 2001. \u00d6sterreichische Computer Gesellschaft."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949339"},{"key":"e_1_3_2_1_4_1","unstructured":"CORBA\/IIOP Specification http:\/\/www.omg.org.  CORBA\/IIOP Specification http:\/\/www.omg.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"key":"e_1_3_2_1_7_1","volume-title":"Advanced Java 2 Platform: How to Program","author":"Deitel Harvey M.","year":"2001","unstructured":"Harvey M. Deitel , Paul J. Deitel , and Sean E. Santry . Advanced Java 2 Platform: How to Program . Prentice Hall , Upper Saddle River, NJ, USA, September 2001 . Harvey M. Deitel, Paul J. Deitel, and Sean E. Santry. Advanced Java 2 Platform: How to Program. Prentice Hall, Upper Saddle River, NJ, USA, September 2001."},{"key":"e_1_3_2_1_8_1","first-page":"554","volume-title":"Proceedings of the 15th NIST-NCSC National Computer Security Conference","author":"Ferraiolo David F.","year":"1992","unstructured":"David F. Ferraiolo and D. Richard Kuhn . Role-Based Access Controls . In Proceedings of the 15th NIST-NCSC National Computer Security Conference , pages 554 -- 563 , Baltimore, MD, USA , October 1992 . David F. Ferraiolo and D. Richard Kuhn. Role-Based Access Controls. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, pages 554--563, Baltimore, MD, USA, October 1992."},{"key":"e_1_3_2_1_10_1","volume-title":"Programming .NET Security. O'Reilly & Associates","author":"Freeman Adam","year":"2003","unstructured":"Adam Freeman and Allen Jones . Programming .NET Security. O'Reilly & Associates , Inc., Sebastopol, CA, USA , June 2003 . Adam Freeman and Allen Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.868026"},{"key":"e_1_3_2_1_12_1","volume-title":"API Design, and Implementation","author":"Gong Li","year":"2003","unstructured":"Li Gong , Gary Ellison , and Mary Dageforde . Inside Java 2 Platform Security: Architecture , API Design, and Implementation . Addison-Wesley , Reading, MA, USA , second edition, May 2003 . Li Gong, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, Reading, MA, USA, second edition, May 2003."},{"key":"e_1_3_2_1_13_1","volume-title":"General Lattice Theory","author":"Gr\u00e4tzer George","year":"2003","unstructured":"George Gr\u00e4tzer . General Lattice Theory . Birkh\u00e4user , Boston, MA, USA , second edition, January 2003 . George Gr\u00e4tzer. General Lattice Theory. Birkh\u00e4user, Boston, MA, USA, second edition, January 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776836"},{"key":"e_1_3_2_1_16_1","unstructured":"IBM Corporation Trade3 Benchmark http:\/\/www.ibm.com\/software\/.  IBM Corporation Trade3 Benchmark http:\/\/www.ibm.com\/software\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505149"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337616"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/512927.512945"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582452"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352613"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_11"},{"key":"e_1_3_2_1_23_1","volume-title":"Advanced Compiler Design and Implementation","author":"Muchnick Steven S.","year":"1997","unstructured":"Steven S. Muchnick . Advanced Compiler Design and Implementation . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA, June 1997 . Steven S. Muchnick. Advanced Compiler Design and Implementation. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, June 1997."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948122"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022494.1022530"},{"key":"e_1_3_2_1_27_1","unstructured":"Object Management Group. Object Constraint Language Specification Chapter 6 of OMG Unified Modeling Language Specification (draft). http:\/\/www.omg.org\/uml February 2001.  Object Management Group. Object Constraint Language Specification Chapter 6 of OMG Unified Modeling Language Specification (draft). http:\/\/www.omg.org\/uml February 2001."},{"key":"e_1_3_2_1_28_1","volume-title":"Enterprise JavaBeans Development Using VisualAge for Java. IBM Redbooks","author":"Picon Joaquin","year":"1999","unstructured":"Joaquin Picon , Patrizia Genchi , Maneesh Sahu , Martin Weiss , and Alain Dessureault . Enterprise JavaBeans Development Using VisualAge for Java. IBM Redbooks . IBM Corporation, International Technical Support Organization , San Jose, CA, USA, June 1999 . Joaquin Picon, Patrizia Genchi, Maneesh Sahu, Martin Weiss, and Alain Dessureault. Enterprise JavaBeans Development Using VisualAge for Java. IBM Redbooks. IBM Corporation, International Technical Support Organization, San Jose, CA, USA, June 1999."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_16"},{"key":"e_1_3_2_1_31_1","volume-title":"Enterprise Java Security","author":"Pistoia Marco","year":"2004","unstructured":"Marco Pistoia , Nataraj Nagaratnam , Larry Koved , and Anthony Nadalin . Enterprise Java Security . Addison-Wesley , Reading, MA, USA , February 2004 . Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security. Addison-Wesley, Reading, MA, USA, February 2004."},{"key":"e_1_3_2_1_32_1","volume-title":"Java 2 Network Security","author":"Pistoia Marco","year":"1999","unstructured":"Marco Pistoia , Duane Reller , Deepak Gupta , Milind Nagnur , and Ashok K. Ramani . Java 2 Network Security . Prentice Hall PTR , Upper Saddle River, NJ, USA, second edition, August 1999 . Marco Pistoia, Duane Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Prentice Hall PTR, Upper Saddle River, NJ, USA, second edition, August 1999."},{"key":"e_1_3_2_1_33_1","first-page":"25","volume-title":"Ricca and Paolo Tonella. Analysis and Testing of Web Applications. In Proceedings of the 23rd International Conference on Software Engineering","author":"Filippo","year":"2001","unstructured":"Filippo Ricca and Paolo Tonella. Analysis and Testing of Web Applications. In Proceedings of the 23rd International Conference on Software Engineering , pages 25 -- 34 , Toronto, ON, Canada , 2001 . IEEE Computer Society. Filippo Ricca and Paolo Tonella. Analysis and Testing of Web Applications. In Proceedings of the 23rd International Conference on Software Engineering, pages 25--34, Toronto, ON, Canada, 2001. IEEE Computer Society."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940107"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507714"},{"key":"e_1_3_2_1_38_1","unstructured":"Sun Microsystems Enterprise JavaBeansTM Specification http:\/\/java.sun.com\/products\/ejb\/.  Sun Microsystems Enterprise JavaBeansTM Specification http:\/\/java.sun.com\/products\/ejb\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Sun Microsystems J2EE 1.4 Tutorial http:\/\/java.sun.com\/j2ee\/1.4\/download.html#tutorial\/.  Sun Microsystems J2EE 1.4 Tutorial http:\/\/java.sun.com\/j2ee\/1.4\/download.html#tutorial\/."},{"key":"e_1_3_2_1_40_1","unstructured":"Sun Microsystems Java PetStore http: \/\/java.sun.com\/developer\/releases\/petstore\/.  Sun Microsystems Java PetStore http: \/\/java.sun.com\/developer\/releases\/petstore\/."},{"key":"e_1_3_2_1_41_1","unstructured":"Sun Microsystems JavaTM Platform Enterprise Edition Specification http:\/\/java.sun.com\/j2ee.  Sun Microsystems JavaTM Platform Enterprise Edition Specification http:\/\/java.sun.com\/j2ee."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146260"}],"event":{"name":"ISSTA06: International Symposium on Software Testing and Analysis 2006","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Portland Maine USA","acronym":"ISSTA06"},"container-title":["Proceedings of the 2006 international symposium on Software testing and analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1146238.1146253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T08:29:26Z","timestamp":1673512166000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1146238.1146253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,21]]},"references-count":39,"alternative-id":["10.1145\/1146238.1146253","10.1145\/1146238"],"URL":"https:\/\/doi.org\/10.1145\/1146238.1146253","relation":{},"subject":[],"published":{"date-parts":[[2006,7,21]]},"assertion":[{"value":"2006-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}