{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:18:54Z","timestamp":1740028734436,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664888"},{"type":"electronic","value":"9783540482499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_32","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:13:11Z","timestamp":1269897191000},"page":"375-384","source":"Crossref","is-referenced-by-count":1,"title":["On Formal Languages for Sequences of Authorization Transformations"],"prefix":"10.1007","author":[{"given":"Yun","family":"Bai","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Y. Bai and V. Varadharajan, A logic for state transformations in authorization policies. the Proceedings of the 10th IEEE Computer Security Foundations Workshop, pp 173\u2013182, Massachusetts, June, 1997.","key":"32_CR1","DOI":"10.1109\/CSFW.1997.596810"},{"doi-asserted-by":"crossref","unstructured":"D. F. C. Brewer and M. J. Nash, The Chinese wall security policy. Proceedings of IEEE Symposium on Security and Privacy, pp 215\u2013228, Oakland, May 1989.","key":"32_CR2","DOI":"10.1109\/SECPRI.1989.36295"},{"doi-asserted-by":"crossref","unstructured":"T. S-C. Chou, M. Winslett, Immortal: a Model-based Belief Revision System, The 2nd International Conference on Principles of Knowledge Representation and Reasoning, Morgan Kaufman Publishers Inc. pp 99\u2013110, 1991.","key":"32_CR3","DOI":"10.1145\/122296.122301"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF03037169","volume":"9","author":"M. Gelfond","year":"1991","unstructured":"M. Gelfond and V. Lifschitz, Classical negation in logic programs and disjunctive databases. New Generation Computing, 9:365\u2013385, 1991.","journal-title":"New Generation Computing"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:15:30Z","timestamp":1739992530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}