{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:08:57Z","timestamp":1760202537295,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443452"},{"type":"electronic","value":"9783540458531"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_14","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T00:42:13Z","timestamp":1178239333000},"page":"229-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Decidability of Safety in Graph-Based Models for Access Control"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Koch","sequence":"first","affiliation":[]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Parisi-Presicce","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"G. Ahn and R. Sandhu. Role-based Authorization Constraint Specification. A CM Trans. of Info. and System Security, 3(4), 2000.","DOI":"10.1145\/382912.382913"},{"key":"14_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/3-540-53982-4_16","volume-title":"Proc. of CAAP91","author":"A. Corradini","year":"1991","unstructured":"A. Corradini, F. Rossi, and F. Parisi-Presicce. Logic programming as hypergraph rewriting. In Proc. of CAAP91, volume 493 of LNCS, pages 275\u2013295. Springer, 1991."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. II: Applications, Languages, and Tools. World Scientific, 1999.","DOI":"10.1142\/4180"},{"issue":"8","key":"14_CR4","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M. A. Harrison","year":"1976","unstructured":"M. A. Harrison, M. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461\u2013471, 1976.","journal-title":"Communications of the ACM"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Trent Jaeger and Jonathan E. Tidswell. Practical safety in flexible access control models. ACM Trans. of Info. and System Security, 4(2), 2001.","DOI":"10.1145\/501963.501966"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"M. Koch, L.V. Mancini, and F. Parisi-Presicce. A Formal Model for Role-Based Access Control using Graph Transformation. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proc. of the 6th European Symposium on Research in Computer Security (ESORICS 2000), number 1895 in Lect. Notes in Comp. Sci., pages 122\u2013139. Springer, 2000.","DOI":"10.1007\/10722599_8"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"M. Koch, L.V. Mancini, and F. Parisi-Presicce. On the Specification and Evolution of Access Control Policies. In S. Osborne, editor, Proc. 6th ACM Symp. on Access Control Models and Technologies, pages 121\u2013130. ACM, May 2001.","DOI":"10.1145\/373256.373280"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"M. Koch, L.V. Mancini, and F. Parisi-Presicce. Foundations for a graph-based approach to the Specification of Access Control Policies. In F. Honsell and M. Miculan, editors, Proc. of Foundations of Software Science and Computation Structures (FoSSaCS 2001), Lect. Notes in Comp. Sci. Springer, March 2001.","DOI":"10.1007\/3-540-45315-6_19"},{"key":"14_CR9","unstructured":"R. J. Lipton and L. Snyder. On synchronization and security. In Demillo et al., editor, Foundations of Secure Computation. Academic Press, 1978."},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"1","author":"M. Nyanchama","year":"1999","unstructured":"M. Nyanchama and S. L. Osborne. The Role Graph Model and Conflict of Interest. A CM Trans. of Info. and System Security, 1(2):3\u201333, 1999.","journal-title":"A CM Trans. of Info. and System Security"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"G. Rozenberg, editor. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. I: Foundations. World Scientific, 1997.","DOI":"10.1142\/9789812384720"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"L. Snyder. On the Synthesis and Analysis of Protection Systems. In Proc. of 6th Symposium on Operating System Principles, volume 11 of Operating System Review, pages 141\u2013150. ACM, 1977.","DOI":"10.1145\/1067625.806557"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Ravi S. Sandhu and Gurpreet S. Suri. Non-Monotonic Transformation of Access Rights. In Proc. IEEE Symposium on Research and Privacy, pages 148\u2013161, 1992.","DOI":"10.1109\/RISP.1992.213264"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T01:54:36Z","timestamp":1736992476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}