{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T06:05:46Z","timestamp":1709273146394},"reference-count":18,"publisher":"International Academy Publishing (IAP)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.9.2.506-511","type":"journal-article","created":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T12:06:03Z","timestamp":1392725163000},"source":"Crossref","is-referenced-by-count":1,"title":["The Design and Simulation of a New Dynamic Credit and Role based Access Control Strategy"],"prefix":"10.17706","volume":"9","author":[{"given":"Haibo","family":"Gao","sequence":"first","affiliation":[]},{"given":"Wenjuan","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Deng","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,2,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2010.02.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.18"},{"issue":"35","key":"ref3","first-page":"23","article-title":"Extended access control model based on RBAC","volume":"41","author":"Wang","year":"2005","unstructured":"[3] Z. J. Wang, Q. Liu. Extended access control model based on RBAC[J]. Computer Engineering and Applications, 2005, 41(35): 23-25.","journal-title":"Computer Engineering and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.05.103"},{"issue":"10","key":"ref5","first-page":"2165","article-title":"A trust-based dynamic access control model","volume":"7","author":"Ma","year":"2010","unstructured":"[5] S. N. Ma, J. S. He, F. Gao, X. G. Sun. A trust-based dynamic access control model[J].Journal of Information and Computational Science, 2010, 7(10):2165-2173.","journal-title":"Journal of Information and Computational Science"},{"issue":"1","key":"ref6","doi-asserted-by":"crossref","first-page":"173","DOI":"10.4304\/jnw.7.1.173-178","article-title":"An access control model based on multi-factors trust","volume":"7","author":"Ma","year":"2012","unstructured":"[6] S. N. Ma, J. S. He, F. Gao. An access control model based on multi-factors trust[J]. Journal of Networks, 2012,7(1):173-178.","journal-title":"Journal of Networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.633"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0083-4"},{"issue":"1","key":"ref9","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","article-title":"Distributed credential chain discovery in trust management","volume":"11","author":"Li","year":"2003","unstructured":"[9] N. Li, W. H. Winsborough, J. C. Mitchell. Distributed credential chain discovery in trust management[J].Journal of Computer Security, 2003, 11(1):35-86.","journal-title":"Journal of Computer Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.589"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.42"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2012.2234055"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.5.1357-1365"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2012.733233"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.5.1357-1365"},{"issue":"1","key":"ref17","first-page":"38","article-title":"Towards a framework for offshore outsource software development risk management model","volume":"6","author":"Islam","year":"2011","unstructured":"[19] S. Islam, S. H. Houmb. Towards a framework for offshore outsource software development risk management model[J]. Journal of Software, 2011, 6(1):38-47.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.6.9.1868-1874"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T04:05:47Z","timestamp":1498104347000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/11031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,1]]},"references-count":18,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2014,2,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.9.2.506-511","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,2,1]]}}}