{"id":"https://openalex.org/W1964211122","doi":"https://doi.org/10.1108/10662240510577095","title":"A metadata\u2010based access control model for web services","display_name":"A metadata\u2010based access control model for web services","publication_year":2005,"publication_date":"2005-02-01","ids":{"openalex":"https://openalex.org/W1964211122","doi":"https://doi.org/10.1108/10662240510577095","mag":"1964211122"},"language":"en","primary_location":{"id":"doi:10.1108/10662240510577095","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240510577095","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088174723","display_name":"Mariemma I. Yag\u00fce","orcid":"https://orcid.org/0000-0002-9099-3880"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Mariemma I. Yag\u00fce","raw_affiliation_strings":["Computer Science Department, University of M\u00e1laga, M\u00e1laga. Spain","Computer Science Department, University of M\u00e1laga, M\u00e1laga, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of M\u00e1laga, M\u00e1laga. Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Computer Science Department, University of M\u00e1laga, M\u00e1laga, Spain#TAB#","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077597205","display_name":"Antonio Ma\u00f1a","orcid":"https://orcid.org/0000-0001-5291-6174"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Antonio Ma\u00f1a","raw_affiliation_strings":["Computer Science Department, University of M\u00e1laga, M\u00e1laga. Spain","Computer Science Department, University of M\u00e1laga, M\u00e1laga, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of M\u00e1laga, M\u00e1laga. Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Computer Science Department, University of M\u00e1laga, M\u00e1laga, Spain#TAB#","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Javier Lopez","raw_affiliation_strings":["Computer Science Department, University of M\u00e1laga, M\u00e1laga. Spain","Computer Science Department, University of M\u00e1laga, M\u00e1laga, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of M\u00e1laga, M\u00e1laga. Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Computer Science Department, University of M\u00e1laga, M\u00e1laga, Spain#TAB#","institution_ids":["https://openalex.org/I82767444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088174723"],"corresponding_institution_ids":["https://openalex.org/I82767444"],"apc_list":null,"apc_paid":null,"fwci":7.4931,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.96420936,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"15","issue":"1","first_page":"99","last_page":"116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8261451721191406},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.6797133684158325},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6144464015960693},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.49377021193504333},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.37797823548316956},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3272784948348999},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3005406856536865}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8261451721191406},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6797133684158325},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6144464015960693},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.49377021193504333},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37797823548316956},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3272784948348999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3005406856536865}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/10662240510577095","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240510577095","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W184620699","https://openalex.org/W1570285508","https://openalex.org/W1576272305","https://openalex.org/W1733713784","https://openalex.org/W1846672139","https://openalex.org/W2019295012","https://openalex.org/W2060690494","https://openalex.org/W2079799821","https://openalex.org/W2089507241","https://openalex.org/W2091712649","https://openalex.org/W2156186849","https://openalex.org/W2166602595","https://openalex.org/W2187360174"],"related_works":["https://openalex.org/W2392768766","https://openalex.org/W2058118494","https://openalex.org/W2095118173","https://openalex.org/W2382021449","https://openalex.org/W2104269053","https://openalex.org/W2106424170","https://openalex.org/W2093262417","https://openalex.org/W2501188010","https://openalex.org/W4299935056","https://openalex.org/W2010935248"],"abstract_inverted_index":{"Purpose":[0],"Provide":[1],"a":[2,88,109,180,227],"secure":[3,181],"solution":[4,182,232],"for":[5,16,113,137,168,185,198,211,233],"web":[6],"services":[7],"(WS).":[8],"A":[9,175],"new":[10],"interoperable":[11,172],"and":[12,30,57,65,91,127,133,160,226,230,242],"distributed":[13],"access":[14,27,224],"control":[15,28,225],"WS":[17,122],"is":[18,99,105],"presented.":[19],"Design/methodology/approach":[20],"Based":[21],"on":[22,107,204],"the":[23,26,44,74,77,150,154,158,169,188,209,237,244,248],"separation":[24],"of":[25,39,55,76,79,116,121,140,162,171,190,201,213,239,247],"(AC)":[29],"authorization":[31,41,206,215,234],"function.":[32],"Findings":[33],"Mechanisms":[34],"presented":[35],"allow":[36],"seamless":[37],"integration":[38],"external":[40,205,214],"entities":[42,216],"in":[43,87],"AC":[45,125,151,184],"system.":[46],"The":[47,96,220],"Semantic":[48],"Policy":[49],"Language":[50],"(SPL)":[51],"developed":[52],"facilitates":[53,236],"specification":[54],"policies":[56,80,126,141,152,202],"semantic":[58,134,199],"policy":[59],"validation.":[60],"SPL":[61],"specifications":[62],"are":[63,145,217],"modular":[64],"can":[66,123],"be":[67],"composed":[68],"without":[69],"ambiguity.":[70],"Also":[71],"addressed":[72],"was":[73],"problem":[75],"association":[78],"to":[81,130,183],"resources":[82],"(WS":[83],"or":[84],"their":[85],"operations)":[86],"dynamic,":[89],"flexible":[90],"automated":[92,138],"way.":[93],"Research":[94],"limitations/implications":[95],"ACProxy":[97],"component":[98],"currently":[100],"under":[101],"development.":[102],"Ongoing":[103],"work":[104],"focused":[106],"achieving":[108],"richer":[110],"\u201cuse":[111],"control\u201d":[112],"some":[114],"types":[115],"WS.":[117,186],"Practical":[118],"implications":[119],"Administrators":[120],"specify":[124],"validate":[128],"them":[129],"find":[131],"syntactic":[132],"errors.":[135],"Components":[136],"validation":[139,200],"at":[142],"different":[143],"levels":[144],"included.":[146],"This":[147],"ensures":[148],"that":[149,178,235],"produce":[153],"desired":[155],"effects,":[156],"facilitating":[157],"creation":[159],"maintenance":[161],"policies.":[163],"It":[164],"also":[165,218],"provides":[166,179,196,222],"mechanisms":[167,197,210],"use":[170],"authorizations.":[173],"Originality/value":[174],"practical":[176],"system":[177,195,221],"To":[187],"best":[189],"one's":[191],"knowledge,":[192],"no":[193],"other":[194],"based":[203],"entities.":[207],"Likewise,":[208],"interoperability":[212],"novel.":[219],"content\u2010based":[223],"secure,":[228],"decentralized":[229],"dynamic":[231],"management":[238],"complex":[240],"systems":[241],"enhances":[243],"overall":[245],"security":[246],"AC.":[249]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
