{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:22:51Z","timestamp":1761805371220,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:00:00Z","timestamp":1498176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,23]]},"DOI":"10.1145\/3134302.3134310","type":"proceedings-article","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T14:02:08Z","timestamp":1510927328000},"page":"187-194","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Fine-Grained Access Control Model and Implementation"],"prefix":"10.1145","author":[{"given":"Ekaterina","family":"Gorshkova","sequence":"first","affiliation":[{"name":"Department of Analytical Information Systems, University of St. Petersburg, Russia"}]},{"given":"Boris","family":"Novikov","sequence":"additional","affiliation":[{"name":"Department of Analytical Information Systems, University of St. Petersburg, Russia"}]},{"given":"Manoj Kumar","family":"Shukla","sequence":"additional","affiliation":[{"name":"India"}]}],"member":"320","published-online":{"date-parts":[[2017,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"233","volume-title":"Formal Aspects in Security and Trust: 2nd IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress","author":"Abdallah A. E.","year":"2004","unstructured":"A. E. Abdallah and E. J. Khayat . A formal model for parameterized role-based access control . In Formal Aspects in Security and Trust: 2nd IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress , August 22-27, 2004 , Toulouse , France , pages 233 -- 246 , 2004. A. E. Abdallah and E. J. Khayat. A formal model for parameterized role-based access control. In Formal Aspects in Security and Trust: 2nd IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pages 233--246, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266875"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/shiro.apache.org\/.  http:\/\/shiro.apache.org\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613109"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1420446.1420456"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759508.1759526"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866480.1866512"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455793"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/369275.369284"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/346057.346074"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127878.1127884"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647246.719477"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809100.1809108"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022494.1022530"},{"key":"e_1_3_2_1_15_1","first-page":"2004","article-title":"national standards institute inc. role based access control","year":"2004","unstructured":"American national standards institute inc. role based access control . ANSI-INCITS 359-- 2004 , 2004 . Accessed April 4, 2010. American national standards institute inc. role based access control. ANSI-INCITS 359--2004, 2004. Accessed April 4, 2010.","journal-title":"ANSI-INCITS 359--"},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/www.omg.org\/spec\/OCL\/.  http:\/\/www.omg.org\/spec\/OCL\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03007-9_2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646156.679850"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_11"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"key":"e_1_3_2_1_23_1","unstructured":"http:\/\/projects.spring.io\/spring-data\/.  http:\/\/projects.spring.io\/spring-data\/."},{"key":"e_1_3_2_1_24_1","unstructured":"https:\/\/docs.spring.io\/spring\/docs\/current\/spring-framework-reference\/html\/expressions.html.  https:\/\/docs.spring.io\/spring\/docs\/current\/spring-framework-reference\/html\/expressions.html."},{"key":"e_1_3_2_1_25_1","unstructured":"http:\/\/projects.spring.io\/spring-security\/.  http:\/\/projects.spring.io\/spring-security\/."},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/www.uml.org\/.  http:\/\/www.uml.org\/."},{"key":"e_1_3_2_1_27_1","unstructured":"The virtual private database in oracle9ir2: An oracle technical white paper. http:\/\/otn.oracle.com\/deploy\/-security\/oracle9ir2\/pdf\/vpd9ir2twp.pdf.  The virtual private database in oracle9ir2: An oracle technical white paper. http:\/\/otn.oracle.com\/deploy\/-security\/oracle9ir2\/pdf\/vpd9ir2twp.pdf."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809858"}],"event":{"name":"CompSysTech'17: 18th International Conference on Computer Systems and Technologies","sponsor":["UORB University of Ruse, Bulgaria","TECHUVB Technical University of Varna, Bulgaria"],"location":"Ruse Bulgaria","acronym":"CompSysTech'17"},"container-title":["Proceedings of the 18th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134302.3134310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134302.3134310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:51Z","timestamp":1750212831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134302.3134310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,23]]},"references-count":28,"alternative-id":["10.1145\/3134302.3134310","10.1145\/3134302"],"URL":"https:\/\/doi.org\/10.1145\/3134302.3134310","relation":{},"subject":[],"published":{"date-parts":[[2017,6,23]]},"assertion":[{"value":"2017-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}