{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:47:19Z","timestamp":1725475639245},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673811"},{"type":"electronic","value":"9783540455707"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10720107_6","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T15:46:59Z","timestamp":1167407219000},"page":"48-53","source":"Crossref","is-referenced-by-count":4,"title":["Power and Permission in Security Systems"],"prefix":"10.1007","author":[{"given":"Babak Sadighi","family":"Firozabadi","sequence":"first","affiliation":[]},{"given":"Marek","family":"Sergot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"M. Abadi","year":"1992","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 1\u201323. Springer, Heidelberg (1992)"},{"key":"6_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511621192","volume-title":"Modal Logic - An Introduction","author":"B.F. Chellas","year":"1980","unstructured":"Chellas, B.F.: Modal Logic - An Introduction. Cambridge University Press, Cambridge (1980)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-49135-X_18","volume-title":"Security Protocols","author":"B. Crispo","year":"1999","unstructured":"Crispo, B.: Delegation of responsibility. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 118\u2013124. Springer, Heidelberg (1999)"},{"key":"6_CR4","first-page":"275","volume-title":"Norms, Logics and Information Systems - New Studies in Deontic Logic and Computer Science","author":"B. Sadighi Firozabadi","year":"1999","unstructured":"Sadighi Firozabadi, B., Tan, Y.H., Lee, R.M.: Formal definitions of fraud. In: McNamara, P., Prakken, H. (eds.) Norms, Logics and Information Systems - New Studies in Deontic Logic and Computer Science, pp. 275\u2013288. IOS Press, Amsterdam (1999)"},{"issue":"3","key":"6_CR5","first-page":"429","volume":"4","author":"A.J.I. Jones","year":"1996","unstructured":"Jones, A.J.I., Sergot, M.J.: A formal characterisation of institutionalised power. Journal IGPL\u00a04(3), 429\u2013445 (1996)","journal-title":"Journal IGPL"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/BF00243391","volume":"15","author":"D. Makinson","year":"1986","unstructured":"Makinson, D.: On the formal representation of right relations. Journal of Philosophical Logic\u00a015, 403\u2013425 (1986)","journal-title":"Journal of Philosophical Logic"},{"issue":"2","key":"6_CR7","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"6_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139173438","volume-title":"Speech Acts","author":"J.R. Searl","year":"1969","unstructured":"Searl, J.R.: Speech Acts. Cambridge University Press, Cambridge (1969)"},{"key":"6_CR9","doi-asserted-by":"crossref","first-page":"195","DOI":"10.7551\/mitpress\/3839.003.0013","volume-title":"Intentions in Communication, ch. 11","author":"D. Vanderverken","year":"1990","unstructured":"Vanderverken, D.: On the unification of speech act theory and formal semantics. In: Cohen, P.R., Morgan, J., Pollack, M.E. (eds.) Intentions in Communication, ch. 11, pp. 195\u2013220. The MIT Press, Cambridge (1990)"},{"key":"6_CR10","unstructured":"Yialelis, N., Sloman, M.: A security framework supporting domain based access control in distributed systems. In: ISOC Symposium on Network and Distributed Systems Security (SNDSS 1996), San Diego, California, pp. 26\u201339. IEEE Press, Los Alamitos (1996)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10720107_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T17:29:28Z","timestamp":1707499768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10720107_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673811","9783540455707"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/10720107_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}