{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:34:21Z","timestamp":1725514461333},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/securware.2009.41","type":"proceedings-article","created":{"date-parts":[[2009,8,25]],"date-time":"2009-08-25T19:37:50Z","timestamp":1251229070000},"page":"224-229","source":"Crossref","is-referenced-by-count":0,"title":["Generation of Role Based Access Control Security Policies for Java Collaborative Applications"],"prefix":"10.1109","author":[{"given":"J.","family":"Briffaut","sequence":"first","affiliation":[]},{"given":"X.","family":"Kauffmann-Tourkestansky","sequence":"additional","affiliation":[]},{"given":"J.-F.","family":"Lalande","sequence":"additional","affiliation":[]},{"given":"W. W.","family":"Smari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Inside Java? 2 Platform Security Architecture API Design and Implementation","year":"2005","author":"gong","key":"3"},{"journal-title":"Java security overview","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/240080.240175"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/43250.27.4.19991001\/30274.4"},{"key":"7","first-page":"123","article-title":"the flask security architecture : system support for diverse security policies","author":"spencer","year":"1999","journal-title":"Proceedings of the Eighth USENIX Security Symposium"},{"journal-title":"Libre Software Meeting 2002 (LSM2002)","article-title":"detection, prevention, and containment : a study of grsecurity","year":"2002","author":"spengler","key":"6"},{"journal-title":"Approach In Linux","article-title":"rule set based access control as proposed in the 'generalized framework for access control","year":"1997","author":"ott","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143461"},{"year":"0","key":"8"}],"event":{"name":"2009 Third International Conference on Emerging Security Information, Systems and Technologies","start":{"date-parts":[[2009,6,18]]},"location":"Athens\/Glyfada, Greece","end":{"date-parts":[[2009,6,23]]}},"container-title":["2009 Third International Conference on Emerging Security Information, Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5210973\/5210974\/05211003.pdf?arnumber=5211003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T21:02:09Z","timestamp":1489784529000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5211003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/securware.2009.41","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}