{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T07:13:22Z","timestamp":1648883602671},"reference-count":14,"publisher":"International Academy Publishing (IAP)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.5.1132-1139","type":"journal-article","created":{"date-parts":[[2013,4,27]],"date-time":"2013-04-27T03:03:54Z","timestamp":1367031834000},"source":"Crossref","is-referenced-by-count":0,"title":["Declaration and Translation of Spatial Access Control Policy"],"prefix":"10.17706","volume":"8","author":[{"given":"Aijuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jingxiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jiuyun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Ji","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,5,1]]},"reference":[{"key":"ref1","first-page":"2456","article-title":"A Policy-based adaptive web services security framework.","author":"Bin","year":"2011","unstructured":"[1] Li Bin, Zhao Lingjun. A Policy-based adaptive web services security framework. Journal of Software. 2011: 2456-2463.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/49.257932"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.38"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2006.5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2009.00403"},{"key":"ref6","first-page":"287","article-title":"On scalability and modularization in the modelling of network security systems[J].","volume-title":"10th European Symposium on Research in Computer Security","volume":"2005","author":"Albuquerque","year":"2005","unstructured":"[11] Albuquerque J. P. D, Krumm H. On scalability and modularization in the modelling of network security systems[J]. 10th European Symposium on Research in Computer Security, Milan,Italy, 2005.9, Berlin Heidelberg, Germany. Springer-Verlag. Lecture Notes in Computer Science 2005, 3679:287\u2013304."},{"issue":"21","key":"ref7","first-page":"5569","article-title":"Research on extensible policy transformation mechanism based on two-phase transformation.","volume":"29","author":"Xiang-dong","year":"2008","unstructured":"[13] DAI Xiang-dong. Research on extensible policy transformation mechanism based on two-phase transformation. Computer Engineering and Design, 2008, 29(21):5569-5571.","journal-title":"Computer Engineering and Design"},{"key":"ref7","unstructured":"[3] Bandara, A. K., Lupu, E. C., Russo, A. Using event calculus to formalize policy specification and analysis[C]. In Proc. of the 4th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2003), 2003:1-14."},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[4] Bandara A. K, Lupu E. C, Moffett J, et al. A goal based approach to policy refinement [C]. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, IBM T J Watson Res. Lab., Yorktown Heights, NY, USA: ACM Press, 2004:3-7.","DOI":"10.1109\/POLICY.2004.1309175"},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[7] Rubio-Loyola, J., Serrat, J., Charalambides, M., et al. A methodological approach towards the refinement problem in policy-based management systems [J]. IEEE Communications Magazine, 2006.44(10):60-68.","DOI":"10.1109\/MCOM.2006.1710414"},{"key":"ref7","unstructured":"[9] Albuquerque J. P. D., Krumm H. Policy modeling and refinement for network securitySystems[C]. In: B.Firozabadi, W.Winsborough, A. Sahai (eds.).Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks. Washington, DC,USA: IEEE ComputerSociety,2005.24-33."},{"key":"ref7","unstructured":"[10] Albuquerque J. P. D. Scalable model-based policy refinement and validation for network security systems [R], Tech.Rep.IC-06-005, Institute of Computing,University of Campinas. March 2006."},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[12] Beigi, M, Calo, S., Verma D. Policy Transformation Techniques in Policy-based Systems Management [C].IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown, NY, 2004.6:13-22.","DOI":"10.1109\/POLICY.2004.1309146"},{"key":"ref7","unstructured":"[14] Extensible Access Control Markup Language (XACML) Version 2. Standard, OASIS, February 2005[EB\/OL]."}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T02:03:49Z","timestamp":1562983429000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/9004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":14,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2013,5,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.5.1132-1139","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}