{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:16:25Z","timestamp":1771658185847,"version":"3.50.1"},"reference-count":27,"publisher":"Zhejiang University Press","issue":"9","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Zhejiang Univ. - Sci. C"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1631\/jzus.c0910564","type":"journal-article","created":{"date-parts":[[2010,9,17]],"date-time":"2010-09-17T00:17:08Z","timestamp":1284682628000},"page":"699-717","source":"Crossref","is-referenced-by-count":2,"title":["An authorization model for collaborative access control"],"prefix":"10.1631","volume":"11","author":[{"given":"Chen-hua","family":"Ma","sequence":"first","affiliation":[]},{"given":"Guo-dong","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jiong","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2010,9,4]]},"reference":[{"key":"ref1","article-title":"The RCL 2000 Language for Specifying Role-Based Authorization Constraints","volume-title":"George Mason University, Fairfax, Virginia, USA","author":"Ahn","year":"2000"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/cts.2007.4621737"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2008-0328"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775419"},{"key":"ref6","article-title":"Providing Architectural Support for Building Context-Aware Applications","volume-title":"Georgia Institute of Technology, Atlanta, Georgia, USA","author":"Dey","year":"2001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/edoc.2003.1233841"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2006.20"},{"key":"ref9","first-page":"213","article-title":"Can We Trust Trust?","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Gambetta","year":"1990"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/secpri.1998.674833"},{"issue":"5","key":"ref11","first-page":"83","article-title":"Analysis, detection and resolution of policy conflict","volume":"31","author":"He","year":"2005","journal-title":"J. Lanzhou Univ. Technol."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064000"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775420"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ichit.2008.225"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545191"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377853"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.a0820366"},{"key":"ref19","first-page":"201","article-title":"Some Conundrums Concerning Separation of Duty","volume-title":"Proc. IEEE Symp. on Research in Security and Privacy","author":"Michael","year":"1990"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/10919399409540214"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775421"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266848"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/csfw.1997.596811"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1023\/a:1013304522599"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952599"}],"container-title":["Journal of Zhejiang University SCIENCE C"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C0910564.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/jzus.C0910564\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C0910564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:52:19Z","timestamp":1771656739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/jzus.C0910564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":27,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["1136"],"URL":"https:\/\/doi.org\/10.1631\/jzus.c0910564","relation":{},"ISSN":["1869-1951","1869-196X"],"issn-type":[{"value":"1869-1951","type":"print"},{"value":"1869-196X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,9]]}}}