{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:27:57Z","timestamp":1745987277750,"version":"3.40.4"},"reference-count":27,"publisher":"Academy Publisher","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.3.723-730","type":"journal-article","created":{"date-parts":[[2013,3,31]],"date-time":"2013-03-31T04:58:18Z","timestamp":1364705898000},"source":"Crossref","is-referenced-by-count":0,"title":["A Workflow-based RBAC Model for Web Services in Multiple Autonomous Domains"],"prefix":"10.4304","volume":"8","author":[{"given":"Zhenwu","family":"WANG","sequence":"first","affiliation":[]},{"given":"Xuejun","family":"ZHAO","sequence":"additional","affiliation":[]},{"given":"Benting","family":"WAN","sequence":"additional","affiliation":[]},{"given":"Jun","family":"XIE","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"BAI","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,3,28]]},"reference":[{"key":"ref1","first-page":"49","article-title":"Establishing RBAC-based secure interoperability in decentralized multi-domain environments[C","volume-title":"Proceedings of the 10th international conference on Information security and cryptology","author":"Jin-wei","year":"2007","unstructured":"[2] HU Jin-wei,LI Rui-xuan,LU Zheng-ding, \"Establishing RBAC-based secure interoperability in decentralized multi-domain environments[C]\"\/\/Proceedings of the 10th international conference on Information security and cryptology,pp 49-63,2007."},{"key":"ref2","volume-title":"Web services Security","author":"O'Neill","year":"2003","unstructured":"[3] O'Neill M,Allam-Baker P,Cann S M,et al, \"Web services Security[M]\",McGraw-Hill,2003."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"issue":"no 8","key":"ref4","doi-asserted-by":"crossref","first-page":"912","DOI":"10.4304\/jnw.5.8.912-920","article-title":"A Generalized Temporal and Spatial Role-Based Access Control Model","volume":"5","author":"Chen","year":"2010","unstructured":"[11] Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Yung-Fa Huang, Chung-Wei Chen, \"A Generalized Temporal and Spatial Role-Based Access Control Model\",Journal of Network, vol 5, no 8,pp.912-920,2010.","journal-title":"Journal of Network"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.3.192-199"},{"key":"ref6","article-title":"A Role based Access Control for Web Services","volume-title":"Proceedings of the 2004 IEEE International Conference on Services Computing","author":"Wonoboesodo","year":"2004","unstructured":"[21] Roosdiana Wonoboesodo,Zahir Tari, \"A Role based Access Control for Web Services\"\/\/Proceedings of the 2004 IEEE International Conference on Services Computing,2004."},{"key":"ref7","first-page":"621","volume-title":"Li Zhang \"Type for Workflow Access Control in Web Service Context","author":"Lu","year":"2009","unstructured":"[24] Yahui Lu,Li Zhang, \"Type for Workflow Access Control in Web Service Context\",Congress on Services,pp 621-628,2009."},{"key":"ref8","article-title":"An Extended RBAC Model for Web Services in Business Process[c","volume-title":"Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business","author":"Liu","year":"2004","unstructured":"[26] Peng Liu,Zhong Chen,\"An Extended RBAC Model for Web Services in Business Process[c]\"\/\/Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business,2004."},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"[1] ZHANG Y, JOSHI J, \"A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies[C]\"\/\/IEEE International Conference on Collaborative Computing:Networking,Applications and Worksharing,pp25-32,2007.","DOI":"10.1109\/COLCOM.2007.4553805"},{"key":"ref8","unstructured":"[5] SHEN Hai-bo,HONG Fan, \"ABAC model based on XACML in Web Service\",Computer Applications,v25,n12,pp 2765-2768,2005."},{"key":"ref8","unstructured":"[6] MA Xiao-ning,FENG Zhi-yong,XU Chao, \"Cross-domain trust-based access control of Web services\",Application Research of Computers,v26,n12,pp 4751-4754,2009."},{"key":"ref8","unstructured":"[7] LIU Zhi-du,JIA Song-hao,ZHANG Shi-hua, \"Research and Application of SOAP Security\",Computer Engineering,v34,n5,pp142-144,2008."},{"key":"ref8","unstructured":"[8] ZHANG Shuai,SUN Jian-ling,XU Bin,et al,\"RBAC based access control model for services compositions cross multiple enterprises\", Journal of Zhejiang University(Engineering Science),v46,n11,pp2035-2043,2012."},{"key":"ref8","unstructured":"[9] SHANG Chaowang,LIU Qingtang,ZHAO Chengling,et al. \"A Research on UCON Enhanced Dynamic Access Control Model for the Business Process of Composite Web Services\", Journal of Wuhan University(Nature and Science Edition), v57,n5,pp408-412,2011."},{"key":"ref8","unstructured":"[10] CHEN Ming,WANG Zhen-wu, \"Three-dimensional Space Access Control Model Based on Role\",Computer Engineering,v34,n9,pp.157-159,2008"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"[13] Ruo-Fei, Han, Hou-Xiang, Wang, Qian, Xiao, Xiao-Pei, Jing, Hui, Li, \"A united access control model for systems in collaborative commerce\",Journal of Networks, v4, n4, p p.279-289,2009.","DOI":"10.4304\/jnw.4.4.279-289"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"[14] Badii, Atta, Fuschi, David, Zhu, Meng, \"Migrating from process automation to process management support: A holistic approach to software engineering applied to media production\",Journal of Multimedia, v5, n5, pp. 404-416,2010.","DOI":"10.4304\/jmm.5.2.104-109"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"[15] Pastorello Jr., Gilberto Zonta, Daltio, Jaudete, Medeiros, Claudia Bauzer, \"A mechanism for propagation of semantic annotations of multimedia content\", Journal of Multimedia, v5, n 4, pp.332-342, 2010","DOI":"10.4304\/jmm.5.4.332-342"},{"key":"ref8","unstructured":"[16] WANG Hao,WU Bo,GE Jin Wen,and WANG Ping, \"Distributed Access Control Scheme Based on Controlled Object in the Internet of Things\",Journal of University of Electronic Science and Technology of China,v141,, n6,pp.893-898,2012"},{"key":"ref8","unstructured":"[17] LANG Bo, \"Access control oriented quantified trust degree representation model for distributed systems\",Journal on Communication,v31,n12,pp.45-54,2010"},{"key":"ref8","unstructured":"[18] Wang Jun,Jia Lianxing,Yao Haichao,and He Jianping, \"Research on a File Level Distributed Secure Access Control System Based on RBAC\",Journal of Computer Research and Development,v41,n1,pp.24-29,2011"},{"key":"ref8","unstructured":"[19] ZHANG Shuai,SUN Jian-ling,XU Bin,HUANG Chao,and KAVS Aleksander J., \"RBAC based access control model for services compositions cross multiple enterprises\",Journal of Zhejiang University(Engineering Science),v46,n11,pp.2035-2043,2011"},{"key":"ref8","unstructured":"[20] ZHAO Jun,CHEN Xiang-guang,LIU Chun-tao,YU Xiang-ming,YUE Bin, \"Study on Application of Distributed Multi-channel MAC Protocols in WSN\",ACTA ARMAMENTARII,v33,n6,pp.695-702,2012"},{"key":"ref8","unstructured":"[22] Yu, Dingguo, \"Role and task-based access control model for web service integration\", Journal of Computational Information Systems, v8, n7, pp2681-2689, 2012."},{"key":"ref8","unstructured":"[23] ZHU Yi-qun,LI Jian-hua,ZHANG Quan-hai, \"A New Dynamic Hierarchical RBAC Model for Web Services\",Journal of Shanghai Jiaotong University,v41,n5,pp 783-787,pp 686-693,2007."},{"key":"ref8","unstructured":"[25] XU Feng,LAI Hai-Guang,HUANG Hao,XIE Li, \"Service-Oriented Role-Based Access Control\",Chinese Journal of Computers,v28,n4,2005."},{"key":"ref8","unstructured":"[27] WANG Zhen-wu,CHEN Ming, \"Workflow management system model based on subtask and action\",Computer Engineering and applications,v43,n23,pp48-50,2007."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:42:46Z","timestamp":1745980966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,28]]},"references-count":27,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2013,3,28]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.3.723-730","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,3,28]]}}}