{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:17:40Z","timestamp":1743128260642,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":8,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_854","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:53:10Z","timestamp":1319723590000},"page":"494-495","source":"Crossref","is-referenced-by-count":0,"title":["Formal Methods and Access Control"],"prefix":"10.1007","author":[{"given":"Michael","family":"Huth","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"854_CR1_854","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M Abadi","year":"1993","unstructured":"Abadi M, Burrows M, Lampson B, Plotkin G (1993) A calculus for access control in distributed systems. In: ACM Transactions on Programming Languages and Systems, vol\u00a015, no 4, pp\u00a0706\u2013734","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"854_CR2_854","first-page":"63","volume-title":"An algebra for fine-grained integration of XACML policies","author":"P Rao","year":"2009","unstructured":"Rao P, Lin D, Bertino E, Li N, Lobo J (2009) An algebra for fine-grained integration of XACML policies. In: Fifteenth Symposium on Access Control Models and Technologies. ACM, pp\u00a063\u201372"},{"key":"854_CR3_854","first-page":"12","volume-title":"Proceedings of the Fifth Workshop on Formal Methods in Security Engineering: From Specifications to Code","author":"G Bruns","year":"2007","unstructured":"Bruns G, Dantas DS, Huth M (2007) A simple and expressive semantic framework for policy composition in access control. In: Proceedings of the Fifth Workshop on Formal Methods in Security Engineering: From Specifications to Code. ACM, pp\u00a012\u201321"},{"key":"854_CR4_854","volume-title":"Security and usability","author":"LF Cranor","year":"2005","unstructured":"Cranor LF, Garfinkel S (2005) Security and usability. O\u2019Reilly Media, Cambridge, MA"},{"key":"854_CR5_854","volume-title":"Role-based access control","author":"DF Ferraiolo","year":"2007","unstructured":"Ferraiolo DF, Kuhn DR, Chandramouli R (2007) Role-based access control, 2nd edn. Artech House, Boston, MA","edition":"2"},{"key":"854_CR6_854","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/POLICY.2009.32","volume-title":"Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks","author":"A Jeffrey","year":"2009","unstructured":"Jeffrey A, Samak T (2009) Model checking firewall policy configurations. In: Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE, pp\u00a060\u201367"},{"key":"854_CR7_854","first-page":"127","volume-title":"Administration in role-based access control","author":"N Li","year":"2007","unstructured":"Li N, Mao Z (2007) Administration in role-based access control. In: Proceedings of the Second ACM Symposium on Information, Computer and Communications Security. ACM, pp\u00a0127\u2013138"},{"key":"854_CR8_854","volume-title":"Access control systems","author":"B Messaoud","year":"2006","unstructured":"Messaoud B (2006) Access control systems. Springer, New York, NY"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:38:57Z","timestamp":1591058337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_854","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}