{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T09:28:50Z","timestamp":1674206930329},"reference-count":12,"publisher":"International Academy Publishing (IAP)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.7.2.398-407","type":"journal-article","created":{"date-parts":[[2012,2,29]],"date-time":"2012-02-29T15:25:51Z","timestamp":1330529151000},"source":"Crossref","is-referenced-by-count":2,"title":["How to Find a Rigorous Set of Roles for Application of RBAC"],"prefix":"10.17706","volume":"7","author":[{"given":"Lijun","family":"Dong","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Maocai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,2,1]]},"reference":[{"key":"ref1","first-page":"38","volume-title":"Roles-based Access Control Models. IEEE Computer","author":"Sandhu","year":"1996"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1145\/501978.501980","volume-title":"Proposed NIST Standard for Role-based Access Control.","author":"Ferraiolo","year":"2001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1236236"},{"key":"ref4","first-page":"21","article-title":"Make least privilege a right (not a privilege).","volume-title":"Proceedings of the 10th conference on Hot Topics in Operating Systems","author":"Krohn","year":"2005"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-540-70760-8_12","article-title":"Levin, Cynthia E. Irvine and Thuy D. Nguyen. Least Privilege in Separation Kernels.","volume":"9","author":"Timothy","year":"2008","journal-title":"Communications in Computer and Information Science"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/SECPRI.1998.674833","article-title":"On the formal definition of separation-of-duty policies and their composition.","volume-title":"Proceedings of 1998 IEEE Symposium on Research in Security and Privacy","author":"Gligor","year":"1998"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596811"},{"key":"ref8","first-page":"532","article-title":"The ASCAA Principles for Next-Generation Role-Based Access Control.","volume-title":"Proc. 3rd International Conference on Availability, Reliability and Security","year":"2008"},{"issue":"3","key":"ref9","first-page":"538","article-title":"Muhlbacher, Christian Praher. DS RBAC-Dynamic Sessions in Role Based Access Control.","volume":"15","author":"Jorg","year":"2009","journal-title":"Journal of Universal Computer Science"},{"key":"ref10","first-page":"1","article-title":"Mutual exclusion and role inheritance affecting least privilege in RBAC.","volume-title":"2010 International Conference for Internet Technology and Secured Transactions (ICITST)","author":"Habib","year":"2010"},{"key":"ref11","component":"chapter 3","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"ref12","volume-title":"Evolutionary Computation for Modeling and Optimization.","author":"Ashlock","year":"2006"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T14:37:54Z","timestamp":1561387074000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/5682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,1]]},"references-count":12,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2012,2,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.7.2.398-407","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,2,1]]}}}