{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:22:50Z","timestamp":1773080570557,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540687603","type":"print"},{"value":"9783540687610","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11955757_19","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:34:20Z","timestamp":1165829660000},"page":"232-247","source":"Crossref","is-referenced-by-count":10,"title":["Integration of Security Policy into System Modeling"],"prefix":"10.1007","author":[{"given":"Nazim","family":"Bena\u00efssa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominique","family":"Cansell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominique","family":"M\u00e9ry","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e8ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003) (June 2003)","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"19_CR2","unstructured":"Abrial, J.-R.: Etude syst\u00e9me: m\u00e9thode et exemple, http:\/\/www.atelierb.societe.com\/documents.html"},{"key":"19_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162","volume-title":"The B Book - Assigning Programs to Meanings","author":"J.R. Abrial","year":"1996","unstructured":"Abrial, J.R.: The B Book - Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)"},{"key":"19_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1674-2","volume-title":"Refinement Calculus","author":"R.-J. Back","year":"1998","unstructured":"Back, R.-J., von Wright, J.: Refinement Calculus. Springer, Heidelberg (1998)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Unified exposition and multics interpretation. MTR-2997 (ESD-TR-75-306), available as NTIS AD-A023 588, MITRE Corporation (1976)","DOI":"10.21236\/ADA023588"},{"key":"19_CR6","unstructured":"Biba, K.: Integrity consideration for secure computer systems. Technical Report MTR-3153, MITRE Corporation (1975)"},{"key":"19_CR7","unstructured":"Cansell, D., M\u00e9ry, D.: Logical foundations of the B method. Computers and Informatics 22 (2003)"},{"key":"19_CR8","volume-title":"Parallel Program Design A Foundation","author":"K.M. Chandy","year":"1988","unstructured":"Chandy, K.M., Misra, J.: Parallel Program Design A Foundation. Addison-Wesley, Reading (1988)"},{"key":"19_CR9","volume-title":"Model Checking","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. The MIT Press, Cambridge (2000)"},{"key":"19_CR10","unstructured":"ClearSy. Web site B4free set of tools for development of B models (2004)"},{"key":"19_CR11","unstructured":"Cuppens, F.: Orbac web page, http:\/\/www.orbac.org"},{"issue":"3","key":"19_CR12","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 222\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Gavrila, S.I., Barkley, J.F.: Formal specification for role based access control user\/role and role\/role relationship management. In: ACM Workshop on Role-Based Access Control, pp. 81\u201390 (1998)","DOI":"10.1145\/286884.286902"},{"key":"19_CR14","unstructured":"Lampson, B.: Protection. In: Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, pp. 437\u2013443. Princeton University (1971)"},{"issue":"2","key":"19_CR15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","B 2007: Formal Specification and Development in B"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11955757_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:18Z","timestamp":1619508078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11955757_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687603","9783540687610"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11955757_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}