{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:25:17Z","timestamp":1725395117835},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/ssiri.2009.63","type":"proceedings-article","created":{"date-parts":[[2009,11,18]],"date-time":"2009-11-18T01:27:34Z","timestamp":1258507654000},"page":"65-74","source":"Crossref","is-referenced-by-count":5,"title":["Detection of Multiple-Duty-Related Security Leakage in Access Control Policies"],"prefix":"10.1109","author":[{"given":"JeeHyun","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Vincent C.","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"446","article-title":"Evaluating access control policies through model checking","author":"zhang","year":"2005","journal-title":"Proceedings of the 8th International Conference on Information Security (ISC 2005)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.16"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029141"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/507712.507714"},{"key":"16","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1145\/1315245.1315300","article-title":"Efficient policy analysis for administrative role based access control","author":"stoller","year":"2007","journal-title":"Proc 14th ACM Conference on Computer and Communications Security (CCS 2007)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2003.1261718"},{"key":"14","article-title":"XACML Profile for Web-Services (WSPL)","author":"moses","year":"2003","journal-title":"OASIS Working Draft"},{"article-title":"automated verification of access control policies","year":"2004","author":"hughes","key":"11"},{"key":"12","first-page":"62","article-title":"A micro-modularity mechanism","author":"jackson","year":"2001","journal-title":"Proc joint meeting of the European Software Engineering Conference and the ACM SIG-SOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE 2001)"},{"year":"0","key":"3"},{"journal-title":"Sun's XACML Implementation","year":"2005","key":"2"},{"journal-title":"OASIS extensible Access Control Markup Language (XACML)","year":"2005","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553562"},{"key":"7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","article-title":"The Ponder policy specification language","author":"damianou","year":"2001","journal-title":"Proc International Workshop on Policies for Distributed Systems and Networks (POLICY 2001)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455800"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796801004208"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"}],"event":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI)","start":{"date-parts":[[2009,7,8]]},"location":"Shanghai, China","end":{"date-parts":[[2009,7,10]]}},"container-title":["2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/5325010\/5325011\/05325389.pdf?arnumber=5325389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T22:41:01Z","timestamp":1558651261000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/5325389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":19,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ssiri.2009.63","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}