{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:25:54Z","timestamp":1777490754636,"version":"3.51.4"},"reference-count":28,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrent Engineering"],"published-print":{"date-parts":[[2004,9]]},"abstract":"<jats:p>A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities. A new role called anonymity provider agent (AP) provides a highly anonymous certificate for consumers during a payment processing. The role AP certifies re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. Each consumer can get a required anonymity level through this new method, depending on the available time, computation and cost. Consumers can also use different banks (cross-payment) and anonymity provider agents (multiple APs) without double-spending problems.<\/jats:p>\n                  <jats:p>Role-based access control is widely used in system management and products since its advantages such as reducing administration cost and complexity. However, conflicting problems may arise between roles when RBAC is applied for system management. For example, mutually exclusive roles may be granted to a user with RBAC and the user may have or derive a high level of authority. To solve these problems, we analyze the duty separation constraints of the roles and role hierarchies in the scheme, then discuss how to grant a role to a user.<\/jats:p>","DOI":"10.1177\/1063293x04046194","type":"journal-article","created":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T18:38:40Z","timestamp":1094063920000},"page":"247-257","source":"Crossref","is-referenced-by-count":13,"title":["An Electronic Cash Scheme and its Management"],"prefix":"10.1177","volume":"12","author":[{"given":"Hua","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Maths & Computing, University of Southern Queensland, Toowoomba, QLD 4350, Australia,"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Mathematics, Victoria University of\r                        Technology, Melbourne City, MC8001, Australia"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Jinli","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Computer Engineering, La Trobe University, Melbourne, VIC 3086, Australia"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2004,9,1]]},"reference":[{"key":"atypb1","volume-title":"PayMe: Secure Payment for World Wide Web Services","author":"Peirce, M.","year":"1995"},{"key":"atypb2","first-page":"55","volume-title":"The Fourth ACM Workshop on Role-Based Access Control","author":"Barkley, J.F."},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_17"},{"key":"atypb4","first-page":"209","volume-title":"Proceedings of the 30th ACM STOC \u201998","author":"Canetti, R."},{"key":"atypb5","volume-title":"An Efficient Off-line Electronic Cash Scheme as Secure as RSA","author":"Chan, A.","year":"1995"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"atypb7","volume-title":"An Introduction to E-cash","author":"Chaum, D.","year":"1995"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_20"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_25"},{"key":"atypb10","volume-title":"The First USENIX Workshop on Electronic Commerce","author":"Cox, B."},{"key":"atypb11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"atypb12","volume-title":"Final Report: NIST Small Business Innovative Research (SBIR) Grant: Role Based Access Control: Phase 1","author":"Feinstein, H.L.","year":"1995"},{"key":"atypb13","first-page":"554","volume-title":"15th National Computer Security Conference","author":"Ferraiolo, D.F."},{"key":"atypb14","doi-asserted-by":"crossref","unstructured":"14. \n                    Ferraiolo, D.F.\n                , \n                    Barkley, J.F.\n                 and \n                    Kuhn, D.R.\n                 (1999). Role-Based Access Control Model and Reference\n                    Implementation within a Corporate Intranet, TISSEC, 34-64.","DOI":"10.1145\/300830.300834"},{"key":"atypb15","first-page":"265","volume-title":"Proceedings of the Twentieth International Colloquium on Automata, Languages and Programming","author":"Franklin, M."},{"issue":"2","key":"atypb16","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"24","author":"Goldschlag, D.","year":"1999","journal-title":"Communications of the ACM"},{"key":"atypb17","volume-title":"SET 1.0\u2014Secure Electronic Transaction Specification","author":"MastercardVisa","year":"1997"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_35"},{"key":"atypb19","volume-title":"Proceedings of Financial Cryptography","author":"Pointcheval, D."},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"atypb21","volume":"1321","author":"Rivest, R.T.","year":"1992","journal-title":"Internet RFC"},{"key":"atypb22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45116-1_4"},{"key":"atypb23","volume-title":"Third ACM Workshop on Role-Based Access Control","author":"Sandhu, R."},{"key":"atypb24","volume-title":"Database Security XI: Status and Prospects","author":"Sandhu, R.","year":"1997"},{"key":"atypb25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"atypb26","first-page":"191","volume-title":"Proceedings of the 24th Australian Computer Science Conference ACSC2001","author":"Wang, H."},{"key":"atypb27","first-page":"240","volume-title":"Advances in Cryptology\u2014Asiacrypt\u201998","author":"Yiannis, T.","year":"1998"},{"key":"atypb28","volume-title":"International Workshop on Practice and Theory in Public Key Cryptography (PKC \u201998)","author":"Yiannis, T."}],"container-title":["Concurrent Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1063293X04046194","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1063293X04046194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T14:47:55Z","timestamp":1777387675000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1063293X04046194"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,9]]}},"alternative-id":["10.1177\/1063293X04046194"],"URL":"https:\/\/doi.org\/10.1177\/1063293x04046194","relation":{},"ISSN":["1063-293X","1531-2003"],"issn-type":[{"value":"1063-293X","type":"print"},{"value":"1531-2003","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,9]]}}}