{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:02:10Z","timestamp":1725512530363},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387094274"},{"type":"electronic","value":"9780387094281"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09428-1_21","type":"book-chapter","created":{"date-parts":[[2008,5,17]],"date-time":"2008-05-17T15:28:30Z","timestamp":1211038110000},"page":"327-342","source":"Crossref","is-referenced-by-count":5,"title":["Assigning Responsibility for Failed Obligations"],"prefix":"10.1007","author":[{"given":"Keith","family":"Irwin","sequence":"first","affiliation":[]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Winsborough","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in pol-icy management and security applications. In VLDB, Hong Kong, China, Aug. 2002. IEEE Computer Society Press.","DOI":"10.1016\/B978-155860869-6\/50051-2"},{"key":"21_CR2","unstructured":"C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Obligation monitoring in policy man-agement. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, June 2003. IEEE Computer Society Press."},{"issue":"3","key":"21_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1023\/A:1025711105609","volume":"11","author":"C Bettini","year":"2003","unstructured":"C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Network Syst. Manage., 11(3):351-372, 2003.","journal-title":"J. Network Syst. Manage."},{"key":"21_CR4","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1613\/jair.1391","volume":"22","author":"H Chockler","year":"2004","unstructured":"H. Chockler and J. Halpern. Responsibility and Blame: A Structural-Model Approach. Jour-nal of Artifical Intelligence Research, 22:93-115, 2004.","journal-title":"Jour-nal of Artifical Intelligence Research"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"D. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001. Springer-Verlag.","DOI":"10.1007\/3-540-44569-2_2"},{"key":"21_CR6","unstructured":"P. Gama and P. Ferreira. Obligation policies: An enforcement platform. In 6th IEEE Inter-national Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stock-holm, Sweden, June 2005. IEEE Computer Society."},{"key":"21_CR7","volume-title":"Collective Obligations and Agents: Who Gets the Blame?","author":"D Grossi","year":"2004","unstructured":"D. Grossi, F. Dignum, L. Royakkers, and J. Meyer. Collective Obligations and Agents: Who Gets the Blame? In International Workshop on Deontic Logic in Computer Science, Madeira, Portugal, May 2004."},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"M. Hilty, D. A. Basin, and A. Pretschner. On obligations. In ESORICS, pages 98-117, 2005.","DOI":"10.1007\/11555827_7"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"K. Irwin, T. Yu, and W. Winsborough. On the Modeling and Analysis of Obligations. In ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct. 2006.","DOI":"10.1145\/1180405.1180423"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"L. Kagal, T. W. Finin, and A. Joshi. A policy language for a pervasive computing environment. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, June 2003. IEEE Computer Society.","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"P. McNamara. Deontic Logic, 2006. Stanford Encyclopedia of Phylosophy. Available at http:\/\/plato.stanford.edu\/entries\/logic-deontic\/.","DOI":"10.1016\/S1874-5857(06)80029-4"},{"key":"21_CR12","unstructured":"M. C. Mont.A System to Handle Privacy Obligations in Enterprises.Technical Report HPL-2005-180, HP Labs-Research,2005.Available at http:\/\/www.hpl.hp.com\/techreports\/2005\/HPL-2005-180.html."},{"key":"21_CR13","unstructured":"M. C. Mont and R. Thyne. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. Technical Report HPL-2006-51, HP Labs - Research, 2006. Available at http:\/\/www.hpl.hp.com\/techreports\/2006\/HPL-2006-51.html."},{"key":"21_CR14","unstructured":"C. Riberiro, A. Zuquete, P. Ferreira, and P. Guedes. SPL: An Access Control Language for Security Policies and Complex Constraints. In Network and Distributed System Security Sym-posium (NDSS), San Diego, CA, Feb. 2001."},{"key":"21_CR15","unstructured":"M. Sailer and M. Morciniec. Monitoring and execution for contract compliance. Technical Report TR 2001-261, HP Labs, 2001."},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"R. Sandhu and P. Samarati. Authentication, Access Control, and Audit. ACM Computing Survey, 28(1), Mar. 1996.","DOI":"10.1145\/234313.234412"},{"key":"21_CR17","unstructured":"V. Swarup, L. Seligman, and A. Rosenthal. Specifying Data Sharing Agreements. In IEEE Workshop on Policies for Distributed Systems and Networks (POLICY), London, Ontario Canada, June 2006."},{"key":"21_CR18","unstructured":"X. TC. Oasis extensible access control markup language (xacml). http:\/\/www.oasis-open.org\/committees\/xacml\/."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"A. Uszok, J. M. Bradshaw, R. Jeffers, N. Suri, P. J. Hayes, M. R. Breedy, L. Bunch, M. John-son, S. Kulkarni, and J. Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, June 2003. IEEE Computer Society Press.","DOI":"10.1109\/POLICY.2003.1206963"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Trust Management II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09428-1_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:33:07Z","timestamp":1605648787000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09428-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387094274","9780387094281"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09428-1_21","relation":{},"subject":[]}}