{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:34:17Z","timestamp":1725449657698},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/scc.2015.39","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:43:02Z","timestamp":1440092582000},"page":"226-233","source":"Crossref","is-referenced-by-count":2,"title":["Automated Policy Combination for Data Sharing across Multiple Organizations"],"prefix":"10.1109","author":[{"given":"Li","family":"Duan","sequence":"first","affiliation":[]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chunhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junliang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Fine-grained filtering to provide access control for data providing services within collaborative environments","author":"brown","year":"2013","journal-title":"Concurrency Computat Pract Exper"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2012.6261095"},{"key":"ref12","first-page":"310","article-title":"Resolving Policy Conflicts - Integrating Policies from Multiple Authors","author":"iliadis","year":"2014","journal-title":"CAiSE 2014 Workshops LNBIP 178"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8092"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"ref3","first-page":"137","article-title":"Security policy reconciliation in distributed computing environments","author":"wang","year":"2004","journal-title":"Proc of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004) Washington IEEE Computer Society"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1330295.1330299"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542229"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.17"},{"key":"ref7","first-page":"3","article-title":"Security policy integration and conflict reconciliation for collaborations among organizations","author":"yau","year":"2008","journal-title":"ubiquitous computing environments in &#x2018;UIC&#x2019;"},{"journal-title":"OASIS XACML TC eXtensible Access Control Markup Language (XACML) version 3 0","year":"2013","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542218"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377853"}],"event":{"name":"2015 IEEE International Conference on Services Computing (SCC)","start":{"date-parts":[[2015,6,27]]},"location":"New York City, NY, USA","end":{"date-parts":[[2015,7,2]]}},"container-title":["2015 IEEE International Conference on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7194374\/7207317\/07207357.pdf?arnumber=7207357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:21:11Z","timestamp":1490379671000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7207357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/scc.2015.39","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}