{"id":"https://openalex.org/W2131806943","doi":"https://doi.org/10.1109/icsmc.2004.1401072","title":"Securing role-based distributed collaboration system","display_name":"Securing role-based distributed collaboration system","publication_year":2005,"publication_date":"2005-03-31","ids":{"openalex":"https://openalex.org/W2131806943","doi":"https://doi.org/10.1109/icsmc.2004.1401072","mag":"2131806943"},"language":"en","primary_location":{"id":"doi:10.1109/icsmc.2004.1401072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2004.1401072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059097791","display_name":"Hualiang Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hualiang Hu","raw_affiliation_strings":["College of Computer Science & Technology, University of Zhejiang, Hangzhou, China","[College of Computer Science and Technology, Zhejiang University, HangZhou, China]"],"affiliations":[{"raw_affiliation_string":"College of Computer Science & Technology, University of Zhejiang, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]},{"raw_affiliation_string":"[College of Computer Science and Technology, Zhejiang University, HangZhou, China]","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048503192","display_name":"Deren Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deren Chen","raw_affiliation_strings":["College of Computer Science & Technology, University of Zhejiang, Hangzhou, China","[College of Computer Science and Technology, Zhejiang University, HangZhou, China]"],"affiliations":[{"raw_affiliation_string":"College of Computer Science & Technology, University of Zhejiang, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]},{"raw_affiliation_string":"[College of Computer Science and Technology, Zhejiang University, HangZhou, China]","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108051852","display_name":"Changqin Huang","orcid":"https://orcid.org/0000-0003-1371-2608"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changqin Huang","raw_affiliation_strings":["College of Computer Science & Technology, University of Zhejiang, Hangzhou, China","[College of Computer Science and Technology, Zhejiang University, HangZhou, China]"],"affiliations":[{"raw_affiliation_string":"College of Computer Science & Technology, University of Zhejiang, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]},{"raw_affiliation_string":"[College of Computer Science and Technology, Zhejiang University, HangZhou, China]","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059097791"],"corresponding_institution_ids":["https://openalex.org/I168879160","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25731009,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":null,"first_page":"5520","last_page":"5524"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8414829969406128},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7398209571838379},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6475618481636047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.605267345905304},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.5661384463310242},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5416803956031799},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5327527523040771},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.5309801697731018},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5281134843826294},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5065172910690308},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5029000639915466},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.47337836027145386},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.42215144634246826},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3314662277698517},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3113481402397156},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.23182082176208496},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07014185190200806}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8414829969406128},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7398209571838379},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6475618481636047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.605267345905304},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.5661384463310242},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5416803956031799},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5327527523040771},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.5309801697731018},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5281134843826294},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5065172910690308},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5029000639915466},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.47337836027145386},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.42215144634246826},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3314662277698517},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3113481402397156},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.23182082176208496},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07014185190200806},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsmc.2004.1401072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2004.1401072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W175664376","https://openalex.org/W1576272305","https://openalex.org/W2021549041","https://openalex.org/W2079444466","https://openalex.org/W2091257550","https://openalex.org/W2115106301","https://openalex.org/W2166602595","https://openalex.org/W2439240014","https://openalex.org/W2626643089","https://openalex.org/W4285719527","https://openalex.org/W6634290446"],"related_works":["https://openalex.org/W1824215999","https://openalex.org/W2389100982","https://openalex.org/W2079666989","https://openalex.org/W1547502928","https://openalex.org/W2153264224","https://openalex.org/W2374358944","https://openalex.org/W2021552465","https://openalex.org/W2217362902","https://openalex.org/W2894602963","https://openalex.org/W2159603360"],"abstract_inverted_index":{"The":[0,124],"idea":[1],"of":[2,44,88,97],"role":[3,89],"has":[4],"been":[5],"widely":[6],"applied":[7,133],"to":[8,101],"solving":[9],"the":[10,41,92,108,111,115],"authority,":[11],"responsibility,":[12],"function":[13,96],"and":[14,40,75,138],"interaction,":[15],"which":[16,114],"are":[17],"associated":[18],"with":[19],"member":[20],"station":[21],"in":[22,31,46,120],"organizations.":[23],"Access":[24],"control":[25,57],"is":[26,70],"a":[27,95],"key":[28],"security":[29,38,45,68,83,116],"issue":[30],"distributed":[32,47],"collaboration":[33,48],"systems.":[34],"After":[35],"analyzing":[36],"corresponding":[37],"requirements":[39],"present":[42],"status":[43],"system,":[49],"this":[50,66,128],"paper":[51,93],"presents":[52],"an":[53,121],"extensive":[54],"role-based":[55],"access":[56],"(ERBAC)":[58],"architecture":[59,104],"based":[60],"on":[61,86],"differentiated":[62],"domain":[63],"management.":[64],"In":[65,106],"architecture,":[67],"management":[69],"classified":[71],"into":[72],"inter-domain":[73],"one":[74],"infra-domain":[76],"one,":[77],"whilst,":[78],"it":[79],"can":[80,117,130],"integrate":[81],"new":[82],"policies.":[84],"Based":[85],"definition":[87],"permission":[90,98],"type,":[91],"introduces":[94],"type":[99],"change":[100],"make":[102],"ERBAC":[103],"flexible.":[105],"addition,":[107],"authors":[109],"discuss":[110],"methods":[112],"by":[113],"be":[118,131],"implemented":[119],"agent-based":[122],"framework.":[123],"practices":[125],"signify":[126],"that":[127],"system":[129],"flexibly":[132],"various":[134],"existing":[135],"policy":[136],"languages":[137],"protocols.":[139]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
