{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:24:03Z","timestamp":1763202243029,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61520106007"],"award-info":[{"award-number":["61520106007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316667","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"467-471","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Role-Based ABAC Model for Implementing Least Privileges"],"prefix":"10.1145","author":[{"given":"Muhammad Umar","family":"Aftab","sequence":"first","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Syed Falahuddin","family":"Quadri","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"family":"Zakria","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Arslan","family":"Javed","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Xuyun","family":"Nie","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_2_1","first-page":"216","article-title":". RBAC Architecture Design Issues in Institutions Collaborative Environment","volume":"10","author":"AFTAB M.U.","year":"2013","unstructured":"AFTAB , M.U. , NISAR , A. , ASIF , M. , ASHRAF , A. , and GILL , B. , 2013 . RBAC Architecture Design Issues in Institutions Collaborative Environment . International Journal of Computer Science Issues 10 , 4, 216 -- 221 . AFTAB, M.U., NISAR, A., ASIF, M., ASHRAF, A., and GILL, B., 2013. RBAC Architecture Design Issues in Institutions Collaborative Environment. International Journal of Computer Science Issues 10, 4, 216--221.","journal-title":"International Journal of Computer Science Issues"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402642"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11104-9_95"},{"key":"e_1_3_2_1_5_1","unstructured":"ANSI INCITS. 2004. Incits 359-2004. Role based access control. American National Standard for Information Technology.  ANSI INCITS. 2004. Incits 359-2004. Role based access control. American National Standard for Information Technology."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2014.7021054"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771492"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"HU V.C. FERRAIOLO D. KUHN R. FRIEDMAN A.R. LANG A.J. COGDELL M.M. SCHNITZER A. SANDLIN K. MILLER R. and SCARFONE K. 2013. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication 800 162.  HU V.C. FERRAIOLO D. KUHN R. FRIEDMAN A.R. LANG A.J. COGDELL M.M. SCHNITZER A. SANDLIN K. MILLER R. and SCARFONE K. 2013. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication 800 162.","DOI":"10.6028\/NIST.SP.800-162"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784782"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.37"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2015.7395571"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"NINGLEKHU J.L. 2017. Attribute-based administration of role-based access control The University of Texas at San Antonio.  NINGLEKHU J.L. 2017. Attribute-based administration of role-based access control The University of Texas at San Antonio.","DOI":"10.1109\/CIC.2017.00027"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2363474"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5120\/8599-2363"},{"key":"e_1_3_2_1_18_1","first-page":"5","article-title":"Analysis of DAC MAC RBAC access control based models for security","volume":"104","author":"UBALE SWAPNAJA A.","year":"2014","unstructured":"UBALE SWAPNAJA , A. , MODANI DATTATRAY , G. , and APTE SULABHA , S. , 2014 . Analysis of DAC MAC RBAC access control based models for security . International Journal of Computer Applications 104 , 5 . UBALE SWAPNAJA, A., MODANI DATTATRAY, G., and APTE SULABHA, S., 2014. Analysis of DAC MAC RBAC access control based models for security. International Journal of Computer Applications 104, 5.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.08.008"}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:11Z","timestamp":1750208531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":19,"alternative-id":["10.1145\/3316615.3316667","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316667","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}