{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:30Z","timestamp":1764996990595},"reference-count":32,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":1461,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Foundation for Science and Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100008530","name":"FEDER","doi-asserted-by":"crossref","award":["FCOMP-01-0124-FEDER-012983"],"award-info":[{"award-number":["FCOMP-01-0124-FEDER-012983"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer and System Sciences"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1016\/j.jcss.2014.02.003","type":"journal-article","created":{"date-parts":[[2014,2,11]],"date-time":"2014-02-11T23:00:46Z","timestamp":1392159646000},"page":"935-952","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":13,"title":["Self-adaptive federated authorization infrastructures"],"prefix":"10.1016","volume":"80","author":[{"given":"Christopher","family":"Bailey","sequence":"first","affiliation":[]},{"given":"David W.","family":"Chadwick","sequence":"additional","affiliation":[]},{"given":"Rog\u00e9rio","family":"de Lemos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jcss.2014.02.003_br0010","unstructured":"ANSI, Information technology \u2013 role based access control, ANSI INCITS 359-2004."},{"key":"10.1016\/j.jcss.2014.02.003_br0020","unstructured":"ITU-T Rec X. 812, ISO\/IEC 10181-3:1996 \u201cSecurity frameworks for open systems: Access control framework\u201d, 1995."},{"key":"10.1016\/j.jcss.2014.02.003_br0030","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","article-title":"Towards a taxonomy of intrusion-detection systems","volume":"31","author":"Debar","year":"1999","journal-title":"Comput. Netw."},{"key":"10.1016\/j.jcss.2014.02.003_br0040","series-title":"Proceedings of the 6th International Conference on Autonomic and Trusted Computing","first-page":"249","article-title":"Trust and reputation policy-based mechanisms for self-protection in autonomic communications","author":"Serrano","year":"2009"},{"key":"10.1016\/j.jcss.2014.02.003_br0050","series-title":"Computer Network Security","article-title":"Usage control: a vision for next generation access control","volume":"vol. 2776","author":"Sandu","year":"2003"},{"key":"10.1016\/j.jcss.2014.02.003_br0060","unstructured":"ID Analytics, White paper: analysis of internal data theft, 2008."},{"key":"10.1016\/j.jcss.2014.02.003_br0070","article-title":"A preliminary model of insider theft of intellectual property","volume":"2","author":"Moore","year":"2011","journal-title":"Wirel. Mob. Netw. Ubiq. Comput. Dependable Appl."},{"key":"10.1016\/j.jcss.2014.02.003_br0080","article-title":"WikiLeaks cables: Bradley Manning faces 52 years in jail","author":"Booth","year":"2010","journal-title":"The Guardian"},{"key":"10.1016\/j.jcss.2014.02.003_br0090","series-title":"Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing","first-page":"37","article-title":"Self-Adaptive Authorization Framework for policy based RBAC\/ABAC models","author":"Bailey","year":"2011"},{"key":"10.1016\/j.jcss.2014.02.003_br0100","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1002\/cpe.1313","article-title":"PERMIS: A modular authorization infrastructure","volume":"20","author":"Chadwick","year":"2008","journal-title":"Concurr. Comput."},{"issue":"4","key":"10.1016\/j.jcss.2014.02.003_br0110","article-title":"Federated security: the Shibboleth approach","volume":"27","author":"\u201cBob\u201d Morgan","year":"2004","journal-title":"EDUCAUSE Q."},{"key":"10.1016\/j.jcss.2014.02.003_br0120","unstructured":"OASIS, eXtensible Access Control Markup Language (XACML), version 2.0."},{"key":"10.1016\/j.jcss.2014.02.003_br0130","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10207-008-0073-y","article-title":"Adding support to XACML for multi-domain user to user dynamic delegation of authority","volume":"8","author":"Chadwick","year":"2009","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.jcss.2014.02.003_br0140","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","article-title":"The vision of autonomic computing","volume":"36","author":"Kephart","year":"2003","journal-title":"Computer"},{"key":"10.1016\/j.jcss.2014.02.003_br0150","series-title":"Software Engineering for Self-Adaptive Systems","first-page":"48","article-title":"Engineering self-adaptive systems through feedback loops","author":"Brun","year":"2009"},{"key":"10.1016\/j.jcss.2014.02.003_br0160","series-title":"Proc. ACM Symp. Applied Computing","first-page":"1524","article-title":"A controlled natural language interface for authoring access control policies","author":"Shi","year":"2011"},{"key":"10.1016\/j.jcss.2014.02.003_br0170","doi-asserted-by":"crossref","DOI":"10.1147\/sj.453.0621","article-title":"Feature-based survey of model transformation approaches","author":"Czarnecki","year":"2006","journal-title":"IBM Syst. J."},{"issue":"1","key":"10.1016\/j.jcss.2014.02.003_br0180","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIC.2007.2","article-title":"Achieving self-management via utility functions","volume":"11","author":"Kephart","year":"2007","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.jcss.2014.02.003_br0190","series-title":"Proc. 6th International Symp. Software Engineering for Adaptive and Self-Managing Systems","first-page":"148","article-title":"Dynamic plans for integrations testing of self-adaptive software systems","author":"da Silva","year":"2011"},{"key":"10.1016\/j.jcss.2014.02.003_br0200","series-title":"EMF: Eclipse Modeling Framework","isbn-type":"print","author":"Steinberg","year":"2008","ISBN":"http:\/\/id.crossref.org\/isbn\/0321331885"},{"key":"10.1016\/j.jcss.2014.02.003_br0220","unstructured":"OASIS, Security Assertion Markup Language (SAML), version 2.0."},{"key":"10.1016\/j.jcss.2014.02.003_br0230","series-title":"IEEE Internet Computing","first-page":"66","article-title":"LDAP: framework, practices, and trends","author":"Koutsonikola","year":"2004"},{"key":"10.1016\/j.jcss.2014.02.003_br0240","series-title":"Proc. FREENIX Track, USENIX Annual Tech. Conf.","article-title":"Berkeley DB","author":"Olson","year":"1999"},{"key":"10.1016\/j.jcss.2014.02.003_br0250","doi-asserted-by":"crossref","unstructured":"C. Bailey, D.W. Chadwick, R. de Lemos, K.W. Siu, Enabling the autonomic management of federated identity providers, in: Proceedings of the 7th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2013, submitted for publication.","DOI":"10.1007\/978-3-642-38998-6_14"},{"key":"10.1016\/j.jcss.2014.02.003_br0260","first-page":"77","article-title":"A flexible architecture for privacy-aware trust management","volume":"5","author":"B\u00f6hm","year":"2010","journal-title":"Theor. Appl. Electron. Commer. Res."},{"key":"10.1016\/j.jcss.2014.02.003_br0270","series-title":"Proceedings of the 7th International Conference on Autonomic and Trusted Computing","first-page":"268","article-title":"A formal framework for trust policy negotiation in autonomic systems: abduction with soft constraints","author":"Bistarelli","year":"2010"},{"key":"10.1016\/j.jcss.2014.02.003_br0280","series-title":"ACM SOSP","article-title":"Logical attestation: An authorization architecture for trustworthy computing","author":"Gun Sirer","year":"2011"},{"key":"10.1016\/j.jcss.2014.02.003_br0290","author":"Haystack Labs Inc."},{"issue":"3","key":"10.1016\/j.jcss.2014.02.003_br0300","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1009700419189","article-title":"Adaptive fraud detection","volume":"1","author":"Fawcett","year":"1997","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.jcss.2014.02.003_br0310","series-title":"Proceedings of the 9th International World Wide Web Conference on Computer Networks: the International Journal of Computer and Telecommunications Networking","first-page":"77","article-title":"Supporting reconfigurable security policies for mobile programs","author":"Hashii","year":"2000"},{"issue":"10","key":"10.1016\/j.jcss.2014.02.003_br0320","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MC.2004.175","article-title":"Rainbow: architecture-based self-adaptation with reusable infrastructure","volume":"37","author":"Garlan","year":"2004","journal-title":"Computer"},{"issue":"12","key":"10.1016\/j.jcss.2014.02.003_br0330","doi-asserted-by":"crossref","first-page":"2860","DOI":"10.1016\/j.jss.2012.02.060","article-title":"Stitch: A language for architecture-based self-adaptation","volume":"85","author":"Cheng","year":"2012","journal-title":"J. Syst. Softw."}],"container-title":["Journal of Computer and System Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0022000014000154?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0022000014000154?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T19:42:48Z","timestamp":1589226168000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0022000014000154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["S0022000014000154"],"URL":"https:\/\/doi.org\/10.1016\/j.jcss.2014.02.003","relation":{},"ISSN":["0022-0000"],"issn-type":[{"value":"0022-0000","type":"print"}],"subject":[],"published":{"date-parts":[[2014,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Self-adaptive federated authorization infrastructures","name":"articletitle","label":"Article Title"},{"value":"Journal of Computer and System Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jcss.2014.02.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}