{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:45:40Z","timestamp":1744159540705,"version":"3.38.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/pst.2010.5593248","type":"proceedings-article","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T20:02:35Z","timestamp":1285963355000},"page":"160-166","source":"Crossref","is-referenced-by-count":7,"title":["Risk analysis in access control systems"],"prefix":"10.1109","author":[{"given":"J.","family":"Ma","sequence":"first","affiliation":[]},{"given":"K.","family":"Adi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Mejri","sequence":"additional","affiliation":[]},{"given":"L.","family":"Logrippo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990062"},{"key":"ref3","article-title":"Secure computer system: Unified exposition and multics interpretation","author":"bell","year":"1976","journal-title":"Technical Report MTR-2997"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286889"},{"key":"ref6","first-page":"332","article-title":"Risk based security analysis of permissions in rbac","author":"nissanke","year":"2004","journal-title":"WOSIS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2007.370725"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85691-9_9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11787181_27"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"261","DOI":"10.3233\/HSN-2006-290","article-title":"Reconfiguring role based access control policies using risk semantics","volume":"15","author":"aziz","year":"2006","journal-title":"J High Speed Networks"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/3-540-61770-1_28","article-title":"Role hierarchies and constraints for lattice-based access controls","author":"sandhu","year":"1996","journal-title":"ESORICS"},{"key":"ref1","first-page":"353","article-title":"A model for attribute-based user-role assignment","author":"a1-kahtani","year":"2002","journal-title":"ACSAC"}],"event":{"name":"2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2010,8,17]]},"location":"Ottawa, Canada","end":{"date-parts":[[2010,8,19]]}},"container-title":["2010 Eighth International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5564352\/5593224\/05593248.pdf?arnumber=5593248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T04:47:50Z","timestamp":1740545270000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5593248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/pst.2010.5593248","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}