{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:58:39Z","timestamp":1758635919455},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290018"},{"type":"electronic","value":"9783540319306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11556992_32","type":"book-chapter","created":{"date-parts":[[2010,9,28]],"date-time":"2010-09-28T04:05:31Z","timestamp":1285646731000},"page":"446-460","source":"Crossref","is-referenced-by-count":58,"title":["Evaluating Access Control Policies Through Model Checking"],"prefix":"10.1007","author":[{"given":"Nan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Mark","family":"Ryan","sequence":"additional","affiliation":[]},{"given":"Dimitar P.","family":"Guelev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"32_CR2","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., U.S.A. (2001)"},{"key":"32_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-30144-8_19","volume-title":"Information Security","author":"D.P. Guelev","year":"2004","unstructured":"Guelev, D.P., Ryan, M.D., Schobbens, P.Y.: Model-checking access control policies. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 219\u2013230. Springer, Heidelberg (2004)"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1029133.1029141","volume-title":"The 2004 ACM Workshop on Formal Methods in Security Engineering","author":"N. Zhang","year":"2004","unstructured":"Zhang, N., Ryan, M., Guelev, D.P.: Synthesising verified access control systems in XACML. In: The 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, pp. 56\u201365. ACM Press, New York (2004)"},{"key":"32_CR5","unstructured":"Godik, S., Moses, T.: eXtensible Access Control Markup Language. OASIS committee. 1.1 edn, Committee specification (2003)"},{"key":"32_CR6","unstructured":"Jackson, D.: Micromodels of Software: Lightweight Modelling and Analysis with Alloy. Software Design Group, MIT Lab for Computer Science (2002), This document and the tool can be obtained from http:\/\/alloy.mit.edu\/"},{"key":"32_CR7","unstructured":"Whaley, J.: JavaBDD: Java BDD implementation (2004), Information about this implementation can be found at http:\/\/javabdd.sourceforge.net\/"},{"key":"32_CR8","unstructured":"Zhang, N.: Web site for the access control policy evaluator and generator (2005), The tool can be obtained from http:\/\/www.cs.bham.ac.uk\/~nxz"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and changeimpact analysis of access-control policies. In: ICSE 2005, St. Louis, Missouri, USA (2005)","DOI":"10.1145\/1062455.1062502"},{"key":"32_CR10","unstructured":"Clarke, E., Fujita, M., McGeer, P., Yang, J., Zhao, X.: Multi-terminal binary decision diagrams: An efficient data structure for matrix representation. In: International Workshop on Logic Synthesis, Tahoe City (1993)"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Tripathi, A.R.: Static verficiation of security requirements in role based CSCW systems. In: SACMAT 2003, Como, Italy (2003)","DOI":"10.1145\/775436.775438"},{"key":"32_CR12","volume-title":"2002 IEEE Symposium on Security and Privacy","author":"B. Chess","year":"2002","unstructured":"Chess, B.: Improving computer security using extended static checking. In: 2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society, Los Alamitos (2002)"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Schaad, A., Moffett, J.: A lightweight approach to specification and analysis of role-based access control extensions. In: SACMAT 2002, Monterey, California, USA (2002)","DOI":"10.1145\/507711.507714"},{"key":"32_CR14","first-page":"730","volume-title":"The 22nd international conference on Software engineering","author":"D. Jackson","year":"2000","unstructured":"Jackson, D., Schechter, I., Shlyahter, H.: Alcoa: the Alloy constraint analyzer. In: The 22nd international conference on Software engineering, pp. 730\u2013733. ACM Press, New York (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11556992_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:48:04Z","timestamp":1605642484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11556992_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290018","9783540319306"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11556992_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}