{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB04211315.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB04211315#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB04211315.json"},"dc:title":[{"@value":"Access control systems : security, identity management and trust models"}],"dc:creator":"by Messaoud Benantar","dc:publisher":[{"@value":"CRC"}],"dcterms:extent":"xxi, 322 p.","cinii:size":"25 cm","dc:language":"eng","dc:date":"2011","cinii:ncid":"BB04211315","cinii:ownerCount":"1","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Benantar, Messaoud"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA002848","@type":"foaf:Organization","foaf:name":"大阪大学 附属図書館 総合図書館","rdfs:seeAlso":{"@id":"https://opac.library.osaka-u.ac.jp/opac/opac_openurl/?ncid=BB04211315"}}],"prism:publicationDate":["c2011"],"cinii:note":["Includes indexes"],"dc:subject":["LCC:TK5105.59","DC22:005.8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA8331133X#entity","dc:title":"Chapman & Hall/CRC cryptography and network security / Series editor, Douglas R. Stinson","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781584888628","dc:title":": hbk"}]}]}