{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:50Z","timestamp":1750306130505,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T00:00:00Z","timestamp":1500422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,19]]},"DOI":"10.1145\/3102304.3109817","type":"proceedings-article","created":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T19:50:15Z","timestamp":1504900215000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security"],"prefix":"10.1145","author":[{"given":"Muhammad Asif","family":"Habib","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Textile University, Faisalabad, Pakistan"}]},{"given":"Mudassar","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Textile University, Faisalabad, Pakistan"}]},{"given":"Nasir","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Textile University, Faisalabad, Pakistan"}]},{"given":"Rehan","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Textile University, Faisalabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2011.039775"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857706"},{"key":"e_1_3_2_1_3_1","first-page":"93","volume-title":"Information Sciences and Systems","author":"Pulur Naim Alperen","year":"2015"},{"volume-title":"The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015)","year":"2015","author":"Abo-Alian Alshaimaa","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2016.1144149"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCCE.2014.V3.336"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.04.014"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_30"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.053"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721744"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613102"},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"71","article-title":"A study on elliptic curve digital signature algorithm (ecdsa) for reliable e-commerce applications","volume":"2","author":"Chaudhry Junaid Ahsenali","year":"2012","journal-title":"SmartCR"},{"key":"e_1_3_2_1_14_1","first-page":"2016","article-title":"based access control model for multitenancy cloud platform","author":"Li Jiangfeng","year":"2016","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2012.6511454"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2674-1_12"},{"key":"e_1_3_2_1_17_1","unstructured":"ANSI INCITS. Incits 359--2004. role-based access control. American Nat\u00e2\u0102&Zacute;;l Standard for Information Technology 2004.  ANSI INCITS. Incits 359--2004. role-based access control. American Nat\u00e2\u0102&Zacute;;l Standard for Information Technology 2004."},{"first-page":"107","volume-title":"National Computer Security Conference, 1993 (16th) Proceedings: Information Systems Security: User Choices","author":"Gilbert Mr Dennis M","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2012.6375422"},{"key":"e_1_3_2_1_20_1","first-page":"179","volume-title":"DBSec","author":"Sandhu Ravi S","year":"1990"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314418.1314431"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545191"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286893"},{"first-page":"202","volume-title":"International Conference on Cyber Warfare and Security","author":"Karp Alan","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_2_1_27_1","unstructured":"J. Shukis. \"what's wrong with the ansi rbac standard? Part 2 - Role-Role SOD is just too simple to work \" in Identity Think Oracle Blog 2011.  J. Shukis. \"what's wrong with the ansi rbac standard? Part 2 - Role-Role SOD is just too simple to work \" in Identity Think Oracle Blog 2011."},{"issue":"2","key":"e_1_3_2_1_28_1","first-page":"245","article-title":"Content-based image retrieval by exploring bandletized regions through support vector machines","volume":"32","author":"Ashraf Rehan","year":"2016","journal-title":"J. Inf. Sci. Eng."},{"key":"e_1_3_2_1_29_1","first-page":"136","article-title":"A novel approach for the gender classification through trained neural networks","volume":"4","author":"Ashraf R","year":"2014","journal-title":"J. Basic Appl. Sci. Res"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/e17063552"}],"event":{"name":"ICFNDS '17: International Conference on Future Networks and Distributed Systems","sponsor":["LABSTICC Labsticc"],"location":"Cambridge United Kingdom","acronym":"ICFNDS '17"},"container-title":["Proceedings of the International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3109817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3102304.3109817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:06Z","timestamp":1750217826000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3102304.3109817"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,19]]},"references-count":30,"alternative-id":["10.1145\/3102304.3109817","10.1145\/3102304"],"URL":"https:\/\/doi.org\/10.1145\/3102304.3109817","relation":{},"subject":[],"published":{"date-parts":[[2017,7,19]]},"assertion":[{"value":"2017-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}