{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:53:48Z","timestamp":1746186828498,"version":"3.40.4"},"reference-count":20,"publisher":"International Academy Publishing (IAP)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.8.5.1220-1229","type":"journal-article","created":{"date-parts":[[2013,4,19]],"date-time":"2013-04-19T14:50:50Z","timestamp":1366383050000},"source":"Crossref","is-referenced-by-count":7,"title":["Model of Domain based RBAC and Supporting Technologies"],"prefix":"10.17706","volume":"8","author":[{"given":"Zan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Lin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiang-yang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Lin-ru","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Bao-sheng","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,5,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87742-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"ref6","first-page":"303","article-title":"A Role-based access control model in distributed environment","volume":"44","author":"Shi","year":"2007","unstructured":"[11] X. L. Shi, Y. Fang, Y. Zhang, Y. L. Li and L. P. Sun, \"A Role-based access control model in distributed environment\", Journal of Sichuan University, vol. 44, pp. 303-307, Apr. 2007.","journal-title":"Journal of Sichuan University"},{"key":"ref7","volume-title":"IRBAC 2000 secure interoperability using dynamic role translation","author":"Kapadia","year":"2000","unstructured":"[13] A. Kapadia, J. Al-mohtadi, R. Campbell and D. Mikunas, \"IRBAC 2000: secure interoperability using dynamic role translation\", Technical Report in Illinois University, 2000."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2008.02754"},{"key":"ref9","first-page":"1","article-title":"A cross \u2013 domain role mapping and authorization framework for RBAC in Grid systems","volume":"06","author":"Geethakumari","year":"2009","unstructured":"[16] G. Geethakumari, D. Negi and D. Sastry, \"A cross \u2013 domain role mapping and authorization framework for RBAC in Grid systems\", International Journal of Computer Science and Applications, vol.06, pp. 1-12, 2009.","journal-title":"International Journal of Computer Science and Applications"},{"key":"ref10","volume-title":"\"Dynamic Virtual Organization management for Service Oriented enterprise applications\" Collaborative Computing Networking","author":"Robinson","year":"2005","unstructured":"[18] P. Robinson, Y. Karabulut and J. Sap, \"Dynamic Virtual Organization management for Service Oriented enterprise applications\", Collaborative Computing: Networking, Applications and Worksharing, Karlsruhe, 2005."},{"key":"ref11","volume-title":"Fuzzy Sets and Fuzzy Logic theory and applications","author":"Klir","year":"1995","unstructured":"[19] G. J. Klir, B. Yuan, \"Fuzzy Sets and Fuzzy Logic: theory and applications\", Prentice Hall PTR, Finland, 1995."},{"key":"ref12","first-page":"1401","article-title":"Research of subjective Trust Management model based on Fuzzy Set theory","volume":"14","author":"Tang","year":"2003","unstructured":"[20] W. Tang and Z. Chen, \"Research of subjective Trust Management model based on Fuzzy Set theory\", Journal of Software, vol. 14, pp. 1401-1408, 2003.","journal-title":"J Softw","ISSN":"https:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref12","unstructured":"[3] S. Vimercati, S. Foresti and P. Samarati, \"Recent advances of access control\", Handbook of Database Security, Jan. 2008."},{"key":"ref12","unstructured":"[7] N. H. Li, J. Mitchell and W. Winsborough, \"Design of a Role-based Trust-management framework\", SP '02 Proceedings, Washington, pp. 114-130, 2002."},{"key":"ref12","unstructured":"[8] Defense Information Systems Agency, \"A security architecture for NET-CENTRIC Enterprise Services\", Version 0.3, Mar. 2004."},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"[9] E. Bertino and P. Bonatti, \"TRBAC: a temporal Role-based access control model\", ACM Transactions on Information and System Security, New York, vol. 4, Aug. 2001.","DOI":"10.1145\/501978.501979"},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"[10] S. Piromruen and J. B. Joshi, \"An RBAC framework for time constrained secure interoperation in multi-domain environment\", WORDS '05 Proceedings, pp. 36-45, Pittsburgh, Feb. 2005.","DOI":"10.1109\/WORDS.2005.18"},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"[12] Y. Demchenko and C. Laat, \"Domain based access control model for distributed collaborative applications\", e-Science '06 Proceedings, Amsterdam, pp. 24-24, 2006.","DOI":"10.1109\/E-SCIENCE.2006.261108"},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"[15] A. Kamath, R. Liscano and A. E. Saddik, \"User-Credential based role mapping in multi-domain environment\", PST '06 Proceedings, New York, 2006.","DOI":"10.1145\/1501434.1501507"},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"[17] Y. Demchenko, L. Gommance, C. Laat, M. Steenbakkers, V. Ciaschini and V. Venturi, \"VO-based dynamic security associations in collaborative grid environment\", CTS 2006. International Symposium on, Amsterdam, pp. 38-47, 2006.","DOI":"10.1109\/CTS.2006.71"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:55:16Z","timestamp":1745992516000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/8404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":20,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2013,5,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.8.5.1220-1229","relation":{},"ISSN":["1796-203X"],"issn-type":[{"type":"print","value":"1796-203X"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}