{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:58:39Z","timestamp":1762505919521},"reference-count":11,"publisher":"International Academy Publishing (IAP)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.7.4.870-877","type":"journal-article","created":{"date-parts":[[2012,4,27]],"date-time":"2012-04-27T20:41:13Z","timestamp":1335559273000},"source":"Crossref","is-referenced-by-count":3,"title":["Formal Specification and Impementation of RBAC Model with SOD"],"prefix":"10.17706","volume":"7","author":[{"given":"Su","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jon","family":"Brewster","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,4,27]]},"reference":[{"key":"ref1","article-title":"Role-Based Access Control","volume-title":"15th NIST-NCSC National Computer Security Conference","year":"1992"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"ref3","article-title":"Nash and Keith R. Poland, \u201cSome Conundrums Concerning Separation of Duty","volume-title":"IEEE Symposium on Research in Security and Privacy","author":"Michael","year":"1990"},{"key":"ref4","first-page":"7","article-title":"The Protection of Information in Computer Systems","volume":"17","author":"Saltzer","year":"1975","journal-title":"Commun. ACM","ISSN":"http:\/\/id.crossref.org\/issn\/0001-0782","issn-type":"print"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref6","first-page":"172","article-title":"Gligor, Serban I. Gavrila, and David Ferraiolo. On the formal definition of separation-of-duty policies and their composition [C].","volume-title":"Proceedings of IEEE Symposium on Research in Security and Privacy","author":"Virgil","year":"1998"},{"key":"ref7","volume-title":"A Verifiable Formal Specification for RBAC","volume":"4318","year":"2006"},{"key":"ref8","first-page":"241","article-title":"Role-Based Access Control (RBAC): Features and Motivations","volume-title":"Proc. 1995 Computer Security Applications Conference","author":"Ferraiolo","year":"1995"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319176"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2006.257716"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:22:44Z","timestamp":1442330564000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/5945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,27]]},"references-count":11,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2012,4,27]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.7.4.870-877","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,4,27]]}}}