{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:32:02Z","timestamp":1743136322807,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22056-2_67","type":"book-chapter","created":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T06:02:00Z","timestamp":1309500120000},"page":"660-667","source":"Crossref","is-referenced-by-count":4,"title":["Modeling Support for Delegating Roles, Tasks, and Duties in a Process-Related RBAC Context"],"prefix":"10.1007","author":[{"given":"Sigrid","family":"Schefer","sequence":"first","affiliation":[]},{"given":"Mark","family":"Strembeck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Atluri, V., Warner, J.: Supporting conditional delegation in secure workflow management systems. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 49\u201358 (2005)","key":"67_CR1","DOI":"10.1145\/1063979.1063990"},{"unstructured":"Barka, E., Sandhu, R.: A Role-Based Delegation Model and Some Extensions. In: Proceedings of the 23rd National Information Systems Security Conference, NISSEC (2000)","key":"67_CR2"},{"doi-asserted-by":"crossref","unstructured":"Barka, E., Sandhu, R.: Framework for Role-Based Delegation Models. In: Proceedings of the 16th Annual Computer Security Applications Conference (2000)","key":"67_CR3","DOI":"10.1109\/ACSAC.2000.898870"},{"key":"67_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44569-2_1","volume-title":"Policies for Distributed Systems and Networks","author":"J. Cole","year":"2001","unstructured":"Cole, J., Derrick, J., Milosevic, Z., Raymond, K.: Author obliged to submit paper before 4 july: Policies in an enterprise specification. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 1\u201317. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: Delegation and Satisfiability in Workflow Systems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 31\u201340 (2008)","key":"67_CR5","DOI":"10.1145\/1377836.1377842"},{"issue":"2","key":"67_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10207-007-0044-8","volume":"7","author":"J. Crampton","year":"2008","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in role-based access control. International Journal of Information Security\u00a07(2), 123\u2013136 (2008)","journal-title":"International Journal of Information Security"},{"doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: On Delegation and Workflow Execution Models. In: Proceedings of the 2008 ACM symposium on Applied computing, SAC (2008)","key":"67_CR7","DOI":"10.1145\/1363686.1364199"},{"unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House (2007)","key":"67_CR8"},{"issue":"8","key":"67_CR9","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1002\/int.20432","volume":"25","author":"H. Mouratidis","year":"2010","unstructured":"Mouratidis, H., J\u00fcrjens, J.: From Goal-Driven Security Requirements Engineering to Secure Design. International Journal of Intelligent Systems\u00a025(8), 813 (2010)","journal-title":"International Journal of Intelligent Systems"},{"unstructured":"OMG. Object Constraint Language Specification. available at: technology documents formal o cl.htm, Version 2.2, formal\/2010-02-01, The Object Management Group (February 2010), http:\/\/www.omg.org","key":"67_CR10"},{"unstructured":"OMG. Unified Modeling Language (OMG UML): Superstructure. available at: http:\/\/www.omg.org technology documents formalu ml.htm, May 2010. Version 2.3, formal\/2010-05-05, The Object Management Group.","key":"67_CR11"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer\u00a029(2) (1996)","key":"67_CR12","DOI":"10.1109\/2.485845"},{"doi-asserted-by":"crossref","unstructured":"Schaad, A., Moffett, J.D.: Delegation of Obligations. In: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, POLICY (2002)","key":"67_CR13","DOI":"10.1109\/POLICY.2002.1011290"},{"unstructured":"Schefer, S., Strembeck, M.: Modeling Process-Related Duties with Extended UML Activity and Interaction Diagrams. Proc. of the International Workshop on Flexible Workflows in Distributed Systems, Workshops der Wissenschaftlichen Konferenz Kommunikationin Verteilten Systemen (WowKiVS), Electronic Communications of the EASST\u00a037 (2011)","key":"67_CR14"},{"doi-asserted-by":"crossref","unstructured":"Strembeck, M.: Embedding Policy Rules for Software-Based Systems in a Requirements Context. In: Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY (2005)","key":"67_CR15","DOI":"10.1109\/POLICY.2005.14"},{"doi-asserted-by":"crossref","unstructured":"Strembeck, M., Mendling, J.: Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology\u00a053(5) (2010), doi:10.1016\/j.infsof.2010.11.015","key":"67_CR16","DOI":"10.1016\/j.infsof.2010.11.015"},{"issue":"3","key":"67_CR17","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.is.2005.11.008","volume":"32","author":"J. Wainer","year":"2007","unstructured":"Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A formal security model of delegation and revocation in workflow systems. Information Systems\u00a032(3), 365\u2013384 (2007)","journal-title":"Information Systems"},{"issue":"4","key":"67_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.sysarc.2008.10.002","volume":"55","author":"C. Wolter","year":"2009","unstructured":"Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture\u00a055(4), 211\u2013223 (2009)","journal-title":"Journal of Systems Architecture"},{"issue":"3","key":"67_CR19","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L. Zhang","year":"2003","unstructured":"Zhang, L., Ahn, G.-J., Chu, B.-T.: A Rule-Based Framework for Role-Based Delegation and Revocation. ACM Transations on Information System Security (TISSEC)\u00a06(3), 404\u2013441 (2003)","journal-title":"ACM Transations on Information System Security (TISSEC)"},{"doi-asserted-by":"crossref","unstructured":"Zhang, X., Oh, S., Sandhu, R.: PBDM: A Flexible Delegation Model in RBAC. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 149\u2013157 (2003)","key":"67_CR20","DOI":"10.1145\/775412.775431"},{"doi-asserted-by":"crossref","unstructured":"Zhao, G., Chadwick, D., Otenko, S.: Obligations for Role Based Access Control. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, vol.\u00a001, pp. 424\u2013431 (2007)","key":"67_CR21","DOI":"10.1109\/AINAW.2007.267"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22056-2_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T12:30:04Z","timestamp":1560342604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22056-2_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783319125671","9783319125688"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22056-2_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}