{"id":"https://openalex.org/W2111284758","doi":"https://doi.org/10.1007/978-0-387-75494-9_53","title":"Role-based Administration of User-role Assignment and Its Oracle Implementation","display_name":"Role-based Administration of User-role Assignment and Its Oracle Implementation","publication_year":2007,"publication_date":"2007-12-27","ids":{"openalex":"https://openalex.org/W2111284758","doi":"https://doi.org/10.1007/978-0-387-75494-9_53","mag":"2111284758"},"language":"en","primary_location":{"id":"doi:10.1007/978-0-387-75494-9_53","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-75494-9_53","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-75494-9_53.pdf","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-75494-9_53.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086580027","display_name":"Lilong Han","orcid":null},"institutions":[{"id":"https://openalex.org/I40963666","display_name":"Central China Normal University","ror":"https://ror.org/03x1jna21","country_code":"CN","type":"education","lineage":["https://openalex.org/I40963666"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lilong Han","raw_affiliation_strings":["Department of Information and Technology&Engineer Research Center on Education Infromation Technology, Huazhong Normal University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Technology&Engineer Research Center on Education Infromation Technology, Huazhong Normal University, Wuhan, China","institution_ids":["https://openalex.org/I40963666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039767448","display_name":"Qingtan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I40963666","display_name":"Central China Normal University","ror":"https://ror.org/03x1jna21","country_code":"CN","type":"education","lineage":["https://openalex.org/I40963666"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingtan Liu","raw_affiliation_strings":["Department of Information and Technology&Engineer Research Center on Education Infromation Technology, Huazhong Normal University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Technology&Engineer Research Center on Education Infromation Technology, Huazhong Normal University, Wuhan, China","institution_ids":["https://openalex.org/I40963666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102907156","display_name":"Zongkai Yang","orcid":"https://orcid.org/0000-0002-0298-0335"},"institutions":[{"id":"https://openalex.org/I40963666","display_name":"Central China Normal University","ror":"https://ror.org/03x1jna21","country_code":"CN","type":"education","lineage":["https://openalex.org/I40963666"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongkai Yang","raw_affiliation_strings":["Department of Information and Technology&Engineer Research Center on Education Infromation Technology, Huazhong Normal University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Technology&Engineer Research Center on Education Infromation Technology, Huazhong Normal University, Wuhan, China","institution_ids":["https://openalex.org/I40963666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086580027"],"corresponding_institution_ids":["https://openalex.org/I40963666"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10934814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"437","last_page":"444"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.9626123905181885},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.7828084230422974},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7030650973320007},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.6790421605110168},{"id":"https://openalex.org/keywords/oracle-database","display_name":"Oracle database","score":0.4833664298057556},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.46082934737205505},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.45566266775131226},{"id":"https://openalex.org/keywords/administration","display_name":"Administration (probate law)","score":0.4474581778049469},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42655766010284424},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.22134298086166382}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.9626123905181885},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.7828084230422974},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7030650973320007},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.6790421605110168},{"id":"https://openalex.org/C2987003710","wikidata":"https://www.wikidata.org/wiki/Q185524","display_name":"Oracle database","level":3,"score":0.4833664298057556},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.46082934737205505},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.45566266775131226},{"id":"https://openalex.org/C2780765947","wikidata":"https://www.wikidata.org/wiki/Q12033531","display_name":"Administration (probate law)","level":2,"score":0.4474581778049469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42655766010284424},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.22134298086166382},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-0-387-75494-9_53","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-75494-9_53","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-75494-9_53.pdf","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-0-387-75494-9_53","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-75494-9_53","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-0-387-75494-9_53.pdf","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2037410949","display_name":"Stress-controlled particulate filters","funder_award_id":"0511002","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2111284758.pdf","grobid_xml":"https://content.openalex.org/works/W2111284758.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1483181473","https://openalex.org/W1499611278","https://openalex.org/W2055189441","https://openalex.org/W2093053320","https://openalex.org/W2102577841","https://openalex.org/W2123584724","https://openalex.org/W2166602595"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"In":[0,48],"role-based":[1,67],"access":[2],"control":[3],"(RBAC)":[4],"permissions":[5],"are":[6,12],"associated":[7],"with":[8],"roles,":[9],"and":[10,77],"users":[11,61],"made":[13],"members":[14],"of":[15,55,60],"appropriate":[16],"roles":[17],"thereby":[18],"acquiring":[19],"the":[20,82],"roles\u2019":[21],"permissions.":[22],"The":[23],"principal":[24],"motivation":[25],"behind":[26],"RBAC":[27,38,56],"is":[28,35,90],"to":[29,36,40,43,62,101,106],"simplify":[30],"administration.":[31],"An":[32],"appealing":[33],"possibility":[34],"use":[37,102],"itself":[39],"manage":[41],"RBAC,":[42],"further":[44],"provide":[45],"administrative":[46,68],"convenience.":[47],"this":[49,75],"paper":[50],"we":[51,98],"investigate":[52],"one":[53],"aspect":[54],"administration":[57],"concerning":[58],"assignment":[59],"roles.":[63],"We":[64],"define":[65],"a":[66],"model,":[69],"called":[70],"URA":[71],"(User-Role":[72],"Assignment),":[73],"for":[74],"purpose":[76],"describe":[78],"its":[79],"implementation":[80],"in":[81],"Oracle":[83,103],"database":[84],"management":[85],"system.":[86],"Although":[87],"our":[88],"model":[89],"quite":[91],"different":[92],"from":[93],"that":[94],"built":[95],"into":[96],"Oracle,":[97],"demonstrate":[99],"how":[100],"stored":[104],"procedures":[105],"implement":[107],"it.":[108]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
