{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T06:28:56Z","timestamp":1775888936737,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540416715","type":"print"},{"value":"9783540446828","type":"electronic"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44682-6_8","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T20:42:52Z","timestamp":1267476172000},"page":"126-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":166,"title":["On the Formal Specification of Electronic Institutions"],"prefix":"10.1007","author":[{"given":"Marc","family":"Esteva","sequence":"first","affiliation":[]},{"given":"Juan-Antonio","family":"Rodr\u00edguez-Aguilar","sequence":"additional","affiliation":[]},{"given":"Carles","family":"Sierra","sequence":"additional","affiliation":[]},{"given":"Pere","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Josep L.","family":"Arcos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,22]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"J. Barkley. Comparing simple role based access control models and access control lists. In Proceedings of the Second ACM Workshop on Role-based Access Control, 1997.","DOI":"10.1145\/266741.266769"},{"key":"8_CR2","unstructured":"J. Barkley, A. V. Cincotta, D. F. Ferraiolo, S. Gavrilla, and D. R. Kuhn. Role based access control for the world wide web. In 20th National Information System Security Conference, 1997."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"M. Becht, T. Gurzki, J. Klarmann, and M. Muscholl. Rope: Role oriented programming environment for multiagent systems. In Proceedings of the Fourth IFCIS Conference on Cooperative Information Systems (CoopIs\u201999), 1999.","DOI":"10.1109\/COOPIS.1999.792181"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"O. Belakhdar and J. Ayel. Modelling approach and tool for designing protocols for automated negotiation in multi-agent systems. In W. van de Velde and J. W. Perram, editors, Agents Breaking Away, number 1038 in Lecture Notes in Artificial Intelligence, pages 100\u2013115. Springer-Verlag, 1996.","DOI":"10.1007\/BFb0031849"},{"key":"8_CR5","unstructured":"R. J. A. Buhr, M. Elammari, T. Gray, and S. Mankowski. A high level visual notation for understanding and designing collaborative, adaptive behaviour in multiagent system. In Proceedings of the 31st Annual Hawaii International Conference on System Sciences (HICSS\u201998), 1998."},{"key":"8_CR6","unstructured":"P. R. Cohen and H. J. Levesque. Communicative actions for artificial agents. In Proceeding s of the First International Conference on Multi-Agent Systems (ICMAS-95), pages 65\u201372, Menlo Park, CA., jun 1995. AAAI Press."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"C. Dellarocas and M. Klein. Civil agent societies: Tools for inventing open agent-mediated electronic marketplaces. In Proceedings ACM Conference on Electronic Commerce (EC-99), 1999.","DOI":"10.1007\/10720026_2"},{"key":"8_CR8","unstructured":"A. Diller. Z An Introduction to Formal Methods. John Wiley & Sons, Inc, 1990."},{"key":"8_CR9","volume-title":"Modern Organizations","author":"A. Etzioni","year":"1964","unstructured":"A. Etzioni. Modern Organizations. Englewood Cliffs, NJ, Prentice-Hall, 1964."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"J. Ferber and O. Gutknetch. A meta-model for the analysis of organizations in multiagent systems. In Proceedings of the Third International Conference on Multi-Agent Systems (ICMAS-98), pages 128\u2013135, 1998.","DOI":"10.1109\/ICMAS.1998.699041"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role based access control model and reference implementation within a corporate intranet. ACM Transactions on Information Systems Security, 1(2), 1999.","DOI":"10.1145\/300830.300834"},{"key":"8_CR12","unstructured":"D. F. Ferraiolo, J. A. Cugini, and D. R. Kuhn. Role-based access control (rbac): Features and motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"S. I. Gavrila and J. F. Barkley. Formal specification for role based access control user\/role and role\/role relationship management. In Proceedings of the Third ACM Workshop on Role-based Access Control, 1998.","DOI":"10.1145\/286884.286902"},{"key":"8_CR14","unstructured":"M. R. Genesereth and R. E. Fikes. Knowldege interchange format version 3.0 reference manual. Technical Report Report Logic-92-1, Logic Group, Computer Science Department, Standford University, June 1992."},{"key":"8_CR15","unstructured":"I. Jacobson, M. Christerrson, P. Jonsson, and G. Overgaard. Object-Oriented Software Engineering-A Use Case Driven Approach. Addison-Wesley, 1996."},{"key":"8_CR16","unstructured":"E. A. Kendall. Agent roles and role models: New abstractions for intelligent agent system analysis and design. In Proceedings of Intelligent Agents for Information and Process Management (AIP\u201998), 1998."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1023\/A:1010046623013","volume":"1","author":"V. R. Lesser","year":"1998","unstructured":"V. R. Lesser. Reflections on the nature of multi-agent coordination and its implications for an agent architecture. Autonomous Agents and Multi-Agent Systems, 1:89\u2013111, 1998.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"P. Noriega and C. Sierra. Towards layered dialogical agents. In Third International Workshop on Agent Theories, Architectures, and Languages, ATAL-96, 1996.","DOI":"10.1007\/BFb0013585"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"D. North. Institutions, Institutional Change and Economics Perfomance. Cambridge U. P., 1990.","DOI":"10.1017\/CBO9780511808678"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"D. Riehle and T. Gross. Role model based framework design and integration. In Proceedings of the 1998 Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA\u201998), pages 117\u2013133. ACM Press, 1998.","DOI":"10.1145\/286936.286951"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"J. A. Rodr\u00edguez-Aguilar, F. J. Mart\u00edn, P. Noriega, P. Garcia, and C. Sierra. Towards a formal specification of complex social structures in multi-agent systems. In J. A. Padget, editor, Collaboration between Human and Artificial Societies, volume 1624 of Lecture Notes in Artificial Intelligence, pages 284\u2013300. Springer-Verlag, 2000.","DOI":"10.1007\/10703260_17"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role based access control models. IEEE Computer, 29(2), 1996.","DOI":"10.1109\/2.485845"},{"key":"8_CR23","volume-title":"Organizations: Rational, Natural, and Open Systems","author":"W. R. Scott","year":"1992","unstructured":"W. R. Scott. Organizations: Rational, Natural, and Open Systems. Englewood Cliffs, NJ, Prentice Hall, 1992."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"J. R. Searle. Speech acts. Cambridge U.P., 1969.","DOI":"10.1017\/CBO9781139173438"},{"key":"8_CR25","unstructured":"C. Sierra and P. Noriega. Institucions electr\u00f2niques. In Proceedings of the Primer Congr\u00e8s Catal\u00e0 d\u2019Intel.lig\u00e8ncia Artificial, 1998."},{"issue":"2","key":"8_CR26","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1017\/S0269888900008122","volume":"10","author":"M. Wooldridge","year":"1995","unstructured":"M. Wooldridge and N. R. Jennings. Intelligent agents: Theory and practice. The Knowledge Engineering Review, 10(2):115\u2013152, 1995.","journal-title":"The Knowledge Engineering Review"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"M. Wooldridge, N. R. Jennings, and D. Kinny. A methodology for agent-oriented analysis and design. In Proceedings of the Third International Conference on Autonomous Agents (AGENTS\u201999), May 1999.","DOI":"10.1145\/301136.301165"}],"container-title":["Lecture Notes in Computer Science","Agent Mediated Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44682-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:43:47Z","timestamp":1739918627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44682-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540416715","9783540446828"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-44682-6_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"22 June 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}