{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:29:13Z","timestamp":1729661353163,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icnsc.2007.372826","type":"proceedings-article","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T12:49:29Z","timestamp":1216385369000},"page":"483-488","source":"Crossref","is-referenced-by-count":1,"title":["Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach"],"prefix":"10.1109","author":[{"given":"Feng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shaoyun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongji","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010071910869"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24623-7_5","article-title":"Agent-Based Hybrid Intelligent Systems: An Agent-Based Framework for Complex Problem Solving","volume":"2938","author":"zhang","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00027-3"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512045"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"year":"0","key":"16"},{"article-title":"Component-based Development of Mobile Agent Systems","year":"2003","author":"marques","key":"13"},{"journal-title":"Security in Computing","year":"2002","author":"pfleeger","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00107-1"},{"key":"12","article-title":"Agent Technology: Enabling Next Generation Computing: A Roadmap for Agent-based Computing","author":"luck","year":"2003","journal-title":"AgentLink Report"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2004.61"},{"year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2002.995801"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2003.1192405"},{"journal-title":"Moving to Role Based","year":"2006","author":"antonio","key":"1"},{"key":"10","first-page":"4","article-title":"Agent-Oriented Software Engineering","author":"jennings","year":"1999","journal-title":"Proceedings of the 12th International Conference on Industrial and Engineering Applications of AI"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"journal-title":"Role-Based Access Control Artech House computer security series","year":"2003","author":"ferraiolo","key":"6"},{"key":"5","first-page":"18","article-title":"An Introduction to Role-Based Access Control","volume":"2","author":"ferraiolo","year":"1995","journal-title":"ACM Transaction on Information and System Security"},{"key":"4","article-title":"Role Based Access Controls","author":"ferraiolo","year":"1992","journal-title":"15th NIST-NCSC National Computer Security Conference Transactions on Information and System Security"},{"article-title":"Requirements-Based Access Control Analysis and Policy specification","year":"2005","author":"he","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/176789.176794"}],"event":{"name":"2007 IEEE International Conference on Networking, Sensing and Control","start":{"date-parts":[[2007,4,15]]},"location":"London, UK","end":{"date-parts":[[2007,4,17]]}},"container-title":["2007 IEEE International Conference on Networking, Sensing and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4238949\/4238950\/04239039.pdf?arnumber=4239039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T06:03:25Z","timestamp":1497765805000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4239039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2007.372826","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}