{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:23Z","timestamp":1725496223371},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_29","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"411-414","source":"Crossref","is-referenced-by-count":7,"title":["Monitors for Usage Control"],"prefix":"10.1007","author":[{"given":"M.","family":"Hilty","sequence":"first","affiliation":[]},{"given":"A.","family":"Pretschner","sequence":"additional","affiliation":[]},{"given":"D.","family":"Basin","sequence":"additional","affiliation":[]},{"given":"C.","family":"Schaefer","sequence":"additional","affiliation":[]},{"given":"T.","family":"Walter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"29_CR1","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1023\/A:1025711105609","volume":"11","author":"C. Bettini","year":"2003","unstructured":"C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. Journal of Network and System Management, 11(3):351\u2013372, 2003.","journal-title":"Journal of Network and System Management"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"S. Colin and L. Mariani. Model-Based Testing of Reactive Systems, chapter 18: Run-Time Verification, pages 525\u2013555. LNCS 3472. 2005.","DOI":"10.1007\/11498490_24"},{"issue":"12","key":"29_CR3","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TSE.2004.91","volume":"30","author":"N. Delgado","year":"2004","unstructured":"N. Delgado, A. Q. Gates, and S. Roach. A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Transactions on Software Engineering, 30(12):859\u2013872, 2004.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"M. Geilen and D. Dams. An on-the-fly tableau construction for a real-time temporal logic. In Proc. 6th International Symposium on Formal Techniques in Real-Time and Fault-Tolerant Systems, LNCS 1926, pages 276\u2013290, 2000.","DOI":"10.1007\/3-540-45352-0_23"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"M. Hilty, D. Basin, and A. Pretschner. On obligations. In 10th European Symposium on Research in Computer Security, LNCS 3679, pages 98\u2013117, 2005.","DOI":"10.1007\/11555827_7"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"M. Hilty, A. Pretschner, C. Schaefer, and T. Walter. A system model and an obligation lanugage for distributed usage control. Technical Report I-ST-20, DoCoMo Euro-Labs, 2006.","DOI":"10.1109\/POLICY.2007.17"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1011254632723","volume":"19","author":"O. Kupferman","year":"2001","unstructured":"O. Kupferman and M. Y. Vardi. Model checking of safety properties. Formal Methods in System Design, 19:291\u2013314, 2001.","journal-title":"Formal Methods in System Design"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"J. Park and R. Sandhu. The UCON ABC Usage Control Model. ACM Transactions on Information and Systems Security, 7:128\u2013174, 2004.","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"A. Pretschner, M. Hilty, and D. Basin. Distributed Usage Control. Communications of the ACM, September 2006.","DOI":"10.1145\/1151030.1151053"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10515-005-6205-y","volume":"12","author":"G. Ro\u015fu","year":"2005","unstructured":"G. Ro\u015fu and K. Havelund. Rewriting-based techniques for runtime verification. Automated Software Engineering, 12:151\u2013197, 2005.","journal-title":"Automated Software Engineering"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:46Z","timestamp":1619669566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_29","relation":{},"subject":[]}}