{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:53Z","timestamp":1725557933326},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407973"},{"type":"electronic","value":"9783540452157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45215-7_22","type":"book-chapter","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T00:27:59Z","timestamp":1277339279000},"page":"267-278","source":"Crossref","is-referenced-by-count":5,"title":["Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach"],"prefix":"10.1007","author":[{"given":"Ruben","family":"Wolf","sequence":"first","affiliation":[]},{"given":"Markus","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Bafoutsou, G., Metzas, G.: Review and functional classification of collaborative systems. International Journal of Information Management, 281\u2013305 (2002)","DOI":"10.1016\/S0268-4012(02)00013-0"},{"key":"22_CR2","unstructured":"Meier, C., Benz, H.: Business process requirements and paradigm of co-operative work: Enhanced Platform. UNITE Project Deliverable (2002), http:\/\/www.unite-project.org"},{"key":"22_CR3","unstructured":"Freier, A., Karlton, P., Kocher, P.: The SSL protocol version 3.0. Internet Draft (1996)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Dierks, C., Allen, C.: The TLS protocol version 1.0. RFC 2246 (1999)","DOI":"10.17487\/rfc2246"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol\u2014HTTP\/1.1. RFC 2616 (1999)","DOI":"10.17487\/rfc2616"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Kristol, D., Montulli, L.: HTTP State Management Mechanism. RFC 2109 (1997)","DOI":"10.17487\/rfc2109"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: towards a unified standard. In: 5th ACM workshop on Role-based Access Control (2000)","DOI":"10.1145\/344287.344301"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. on Inf. and Syst. Security\u00a04 (2001)","DOI":"10.1145\/501978.501980"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Bertino, E., Pagani, E., Rossi, G., Samarati, P.: Protecting information on the web. Comm. of the ACM\u00a043 (2000)","DOI":"10.1145\/352515.352518"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Joshi, J., Aref, W., Spafford, E.: Security models for web-based applications. Comm. of the ACM\u00a044 (2001)","DOI":"10.1145\/359205.359224"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-36086-7_28","volume-title":"Mobile Agents for Telecommunication Applications","author":"M. Zapf","year":"2002","unstructured":"Zapf, M., Reinema, R., Wolf, R., T\u00fcrpe, S.: UNITE\u2014an agent-oriented teamwork environment. In: Karmouch, A., Magedanz, T., Delgado, J. (eds.) MATA 2002. LNCS, vol.\u00a02521, pp. 302\u2013315. Springer, Heidelberg (2002)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Role activation hierarchies. In: 3rd ACM workshop on Role-based access control (1998)","DOI":"10.1145\/286884.286891"},{"key":"22_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809088","volume-title":"Introduction to Lattices and Order","author":"B. Davey","year":"2002","unstructured":"Davey, B., Priestley, H.: Introduction to Lattices and Order. Cambridge Univ Press, Cambridge (2002)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Jonsson, B.: Arithmetic of ordered sets. In: Rival, J. (ed.) Ordered Sets. Proceedings of the NATO Advanced Study Institute (1981)","DOI":"10.1007\/978-94-009-7798-3_1"},{"key":"22_CR15","unstructured":"Barkley, J., Cincotta, A., Ferraiolo, D., Gavrilla, S., Kuhn, D.: Role-based access control for the world wide web. In: 20th National Information Systems Security Conference (1997)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R., Ahn, G.: Role-based access control on the web. ACM Trans. on Inf. and Syst. Security\u00a04 (2001)","DOI":"10.1145\/383775.383777"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Tari, Z., Chan, S.: A role-based access control model for intranet security. IEEE Internet Computing\u00a01 (1997)","DOI":"10.1109\/4236.623965"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Chadwick, D., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. In: 7th ACM Symposium on Access Control Models and Technologies (2002)","DOI":"10.1145\/507711.507732"},{"key":"22_CR19","unstructured":"Covington, M., Moyer, M., Ahamad, M.: Generalized role-based access control for securing future applications. In: 23rd Nat. Inform. Syst. Security Conference, Baltimore, MD (2000)"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Georgiadis, C., Mavridis, I., Pangalos, G., Thomas, R.: Flexible team-based access control using contexts. In: 6th ACM Symposium on Access Control Models and Technologies, pp. 21\u201330 (2001)","DOI":"10.1145\/373256.373259"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45215-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T10:57:04Z","timestamp":1559213824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45215-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407973","9783540452157"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45215-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}