{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T09:52:41Z","timestamp":1765619561088},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/cic.2016.022","type":"proceedings-article","created":{"date-parts":[[2017,1,9]],"date-time":"2017-01-09T21:42:52Z","timestamp":1483998172000},"page":"64-73","source":"Crossref","is-referenced-by-count":14,"title":["An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis"],"prefix":"10.1109","author":[{"given":"Sadhana","family":"Jha","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990049"},{"key":"ref11","first-page":"33","article-title":"Towards formal security analysis of gtrbac using timed automata","author":"uzun","year":"2009","journal-title":"Proceedings of the 14th ACM Symposium on Access Control Models and Technologies"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295169"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.07.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45204-8_28"},{"key":"ref15","first-page":"1","article-title":"Farbac: A fine-grained administrative rbac model","author":"jiang","year":"2015","journal-title":"Proceedings of the 7th IEEE Annual Information Technology Electronics and Mobile Communication Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517891"},{"key":"ref17","first-page":"391","article-title":"Security analysis in role-based access control","author":"ninghui","year":"2006","journal-title":"ACM Transactions on Information and System Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1066100.1066103"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70225"},{"key":"ref4","first-page":"177","article-title":"Role based access control with spatio-temporal context for mobile applications","author":"aich","year":"2009","journal-title":"Transactions on Computational Science"},{"key":"ref27","first-page":"108","article-title":"Towards an attribute based constraints specification language","author":"zaman","year":"2013","journal-title":"Proceedings of the IEEE International Conference on Social Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065547"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816032"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"journal-title":"Software Abstractions","year":"2006","author":"jackson","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507737"},{"article-title":"Guide to attribute based access control (abac) definition and considerations. nist special publication","year":"2014","author":"hu","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.10"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542214"},{"key":"ref24","first-page":"1","article-title":"Analysis of a relationship based access control model","author":"bennett","year":"2015","journal-title":"Proceedings of the 8th International C* Conference on Computer Science& Software Engineering"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.08.001"},{"key":"ref26","first-page":"41","article-title":"A unified attribute-based access control model covering dac, mac and rbac","author":"jin","year":"2012","journal-title":"Proceedings of the 26th Annual Conference on Data and Applications Security and Privacy"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26961-0_5"}],"event":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","start":{"date-parts":[[2016,11,1]]},"location":"Pittsburgh, PA, USA","end":{"date-parts":[[2016,11,3]]}},"container-title":["2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7808233\/7809672\/07809693.pdf?arnumber=7809693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:08:54Z","timestamp":1513195734000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7809693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cic.2016.022","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}