{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:17:20Z","timestamp":1742969840618,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031656323"},{"type":"electronic","value":"9783031656330"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":207,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Existing access policy languages like Cedar equipped with SMT-based automated reasoning capabilities are effective in providing formal guarantees about the policies. However, this scheme only supports access control based on deterministic information. Observing that certain information useful for access control can be described by random variables, we are motivated to develop a new paradigm of access control in which access policies contain rules about uncertainty, or more precisely, probabilities of random events. To compute these probabilities, we rely on probabilistic programming languages. Additionally, we show that the probabilistic part of these policies can be encoded in linear real arithmetic, which enables practical automated reasoning tasks such as proving relative permissiveness between policies. We demonstrate the advantages of the proposed probabilistic policies over the existing paradigm through two case studies on real-world datasets with a prototype implementation.<\/jats:p>","DOI":"10.1007\/978-3-031-65633-0_20","type":"book-chapter","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T07:03:08Z","timestamp":1721890988000},"page":"443-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Probabilistic Access Policies with\u00a0Automated Reasoning Support"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0335-1151","authenticated-orcid":false,"given":"Shaowei","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3612-1203","authenticated-orcid":false,"given":"Yunbo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,26]]},"reference":[{"key":"20_CR1","unstructured":"Another misconfigured amazon s3 server leaks data of 50,000 Australian employees. https:\/\/www.scmagazine.com\/news\/breach\/another-misconfigured-amazon-s3-server-leaks-data-of-50000-australian-employees"},{"key":"20_CR2","unstructured":"Cedar Language. https:\/\/www.cedarpolicy.com\/en"},{"key":"20_CR3","unstructured":"Cloud leak: WSJ parent company dow jones exposed customer data | UpGuard. https:\/\/www.upguard.com\/breaches\/cloud-leak-dow-jones"},{"key":"20_CR4","unstructured":"eXtensible access control markup language (XACML) version 3.0 p.\u00a0154. https:\/\/www.oasis-open.org\/standard\/xacmlv3-0"},{"key":"20_CR5","unstructured":"Akter, T., Dosono, B., Ahmed, T., Kapadia, A., Semaan, B.: \u201ci am uncomfortable sharing what i can\u2019t see\u201d: privacy concerns of the visually impaired with camera based assistive applications, pp. 1929\u20131948. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/akter"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Ardagna, C., Cremonini, M., di\u00a0Vimercati, S.D.C., Samarati, P.: Privacy-enhanced location-based access control. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 531\u2013552. Springer, Boston (2022). https:\/\/doi.org\/10.1007\/978-0-387-48533-1_22","DOI":"10.1007\/978-0-387-48533-1_22"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., di\u00a0Vimercati, S.D.C., Samarati, P.: Supporting location-based conditions in access control policies. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security - ASIACCS \u201906. p.\u00a0212. ACM Press (2006). https:\/\/doi.org\/10.1145\/1128817.1128850","DOI":"10.1145\/1128817.1128850"},{"issue":"1","key":"20_CR8","first-page":"3846","volume":"18","author":"SH Bach","year":"2017","unstructured":"Bach, S.H., Broecheler, M., Huang, B., Getoor, L.: Hinge-loss Markov random fields and probabilistic soft logic. J. Mach. Learn. Res. 18(1), 3846\u20133912 (2017)","journal-title":"J. Mach. Learn. Res."},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-030-53288-8_9","volume-title":"Computer Aided Verification","author":"J Backes","year":"2020","unstructured":"Backes, J., et al.: Stratified abstraction of access control policies. In: Lahiri, S.K., Wang, C. (eds.) CAV 2020. LNCS, vol. 12224, pp. 165\u2013176. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-53288-8_9"},{"key":"20_CR10","doi-asserted-by":"publisher","unstructured":"Backes, J., et al.: Semantic-based automated reasoning for AWS access policies using SMT. In: 2018 Formal Methods in Computer Aided Design (FMCAD), pp.\u00a01\u20139 (2018). https:\/\/doi.org\/10.23919\/FMCAD.2018.8602994","DOI":"10.23919\/FMCAD.2018.8602994"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Bauer, L., Cranor, L.F., Reeder, R.W., Reiter, M.K., Vaniea, K.: Real life challenges in access-control management. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI \u201909, pp. 899\u2013908. Association for Computing Machinery (2009). https:\/\/doi.org\/10.1145\/1518701.1518838","DOI":"10.1145\/1518701.1518838"},{"key":"20_CR12","unstructured":"Hamner, B., Kenmonta, Cukierski, W.: Amazon.com - employee access challenge (2013). https:\/\/kaggle.com\/competitions\/amazon-employee-access-challenge"},{"key":"20_CR13","unstructured":"Bingham, E., et al.: Pyro: deep universal probabilistic programming (2018). https:\/\/arxiv.org\/abs\/1810.09538v1"},{"key":"20_CR14","doi-asserted-by":"publisher","unstructured":"Bornholt, J., Mytkowicz, T., McKinley, K.S.: Uncertain$$<$$t$$>$$: a first-order type for uncertain data. In: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems. ASPLOS \u201914, pp. 51\u201366. Association for Computing Machinery (2014). https:\/\/doi.org\/10.1145\/2541940.2541958","DOI":"10.1145\/2541940.2541958"},{"key":"20_CR15","doi-asserted-by":"publisher","unstructured":"Cappelletti, L., Valtolina, S., Valentini, G., Mesiti, M., Bertino, E.: On the quality of classification models for inferring ABAC policies from access logs. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 4000\u20134007 (2019). https:\/\/doi.org\/10.1109\/BigData47090.2019.9005959","DOI":"10.1109\/BigData47090.2019.9005959"},{"key":"20_CR16","doi-asserted-by":"publisher","unstructured":"Chen, S., Li, Z., Dangelo, F., Gao, C., Fu, X.: A case study of security and privacy threats from augmented reality (AR). In: 2018 International Conference on Computing, Networking and Communications (ICNC), pp. 442\u2013446 (2018). https:\/\/doi.org\/10.1109\/ICCNC.2018.8390291","DOI":"10.1109\/ICCNC.2018.8390291"},{"key":"20_CR17","doi-asserted-by":"publisher","unstructured":"Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: an experiment on quantified risk-adaptive access control. In: 2007 IEEE Symposium on Security and Privacy (SP \u201907), pp. 222\u2013230 (2007). https:\/\/doi.org\/10.1109\/SP.2007.21, ISSN: 2375-1207","DOI":"10.1109\/SP.2007.21"},{"key":"20_CR18","doi-asserted-by":"publisher","unstructured":"Cleeff, A.v., Pieters, W., Wieringa, R.: Benefits of location-based access control: a literature study. In: 2010 IEEE\/ACM International Conference on Green Computing and Communications & Int\u2019l Conference on Cyber, Physical and Social Computing, pp. 739\u2013746 (2010). https:\/\/doi.org\/10.1109\/GreenCom-CPSCom.2010.148","DOI":"10.1109\/GreenCom-CPSCom.2010.148"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-030-04834-1_2","volume-title":"From Database to Cyber Security","author":"S Das","year":"2018","unstructured":"Das, S., Mitra, B., Atluri, V., Vaidya, J., Sural, S.: Policy engineering in RBAC and ABAC. In: Samarati, P., Ray, I., Ray, I. (eds.) From Database to Cyber Security. LNCS, vol. 11170, pp. 24\u201354. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04834-1_2"},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"De\u00a0Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: a literature survey 52(6), 110:1\u2013110:37. https:\/\/doi.org\/10.1145\/3359626","DOI":"10.1145\/3359626"},{"key":"20_CR21","unstructured":"De\u00a0Raedt, L., Kimmig, A., Toivonen, H.: ProbLog: a probabilistic prolog and its application in link discovery. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence. IJCAI\u201907, San Francisco, CA, USA, pp. 2468\u20132473. Morgan Kaufmann Publishers Inc. (2007)"},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Eiers, W., Sankaran, G., Li, A., O\u2019Mahony, E., Prince, B., Bultan, T.: Quantifying permissiveness of access control policies. In: Proceedings of the 44th International Conference on Software Engineering. ICSE \u201922, pp. 1805\u20131817. Association for Computing Machinery (2022). https:\/\/doi.org\/10.1145\/3510003.3510233","DOI":"10.1145\/3510003.3510233"},{"key":"20_CR23","doi-asserted-by":"publisher","unstructured":"Frank, M., Basin, D., Buhmann, J.M.: A class of probabilistic models for role engineering. In: Proceedings of the 15th ACM conference on Computer and communications security. CCS \u201908, pp. 299\u2013310. Association for Computing Machinery (2008). https:\/\/doi.org\/10.1145\/1455770.1455809","DOI":"10.1145\/1455770.1455809"},{"issue":"1","key":"20_CR24","first-page":"327","volume":"342","author":"AD Garcez","year":"2022","unstructured":"Garcez, A.D., et al.: Neural-symbolic learning and reasoning: a survey and interpretation. Neuro-Symbolic Artif. Intell. State Art 342(1), 327 (2022)","journal-title":"Neuro-Symbolic Artif. Intell. State Art"},{"issue":"11","key":"20_CR25","doi-asserted-by":"publisher","first-page":"12387","DOI":"10.1007\/s10462-023-10448-w","volume":"56","author":"AD Garcez","year":"2023","unstructured":"Garcez, A.D., Lamb, L.C.: Neurosymbolic AI: the 3rd wave. Artif. Intell. Rev. 56(11), 12387\u201312406 (2023). https:\/\/doi.org\/10.1007\/s10462-023-10448-w","journal-title":"Artif. Intell. Rev."},{"key":"20_CR26","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7432.001.0001","volume-title":"Introduction to Statistical Relational Learning","author":"L Getoor","year":"2007","unstructured":"Getoor, L., Taskar, B.: Introduction to Statistical Relational Learning. MIT Press, Cambridge (2007)"},{"key":"20_CR27","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-42553-1_3","volume-title":"Case Studies in Applied Bayesian Data Science","author":"E Goan","year":"2020","unstructured":"Goan, E., Fookes, C.: Bayesian neural networks: an introduction and survey. In: Mengersen, K.L., Pudlo, P., Robert, C.P. (eds.) Case Studies in Applied Bayesian Data Science. LNM, vol. 2259, pp. 45\u201387. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42553-1_3"},{"key":"20_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-30144-8_19","volume-title":"Information Security","author":"DP Guelev","year":"2004","unstructured":"Guelev, D.P., Ryan, M., Schobbens, P.Y.: Model-checking access control policies. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 219\u2013230. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30144-8_19"},{"key":"20_CR29","unstructured":"He, W., Golla, M., Padhi, R., Ofek, J., D\u00fcrmuth, M., Fernandes, E., Ur, B.: Rethinking access control and authentication for the home internet of things. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 255\u2013272 (2018)"},{"key":"20_CR30","unstructured":"Jana, S., et al.: Enabling fine-grained permissions for augmented reality applications with recognizers. In: Proceedings of the 22nd USENIX Conference on Security. SEC\u201913, pp. 415\u2013430. USENIX Association (2013)"},{"key":"20_CR31","doi-asserted-by":"publisher","unstructured":"Jeffrey, A., Samak, T.: Model checking firewall policy configurations. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 60\u201367. https:\/\/doi.org\/10.1109\/POLICY.2009.32","DOI":"10.1109\/POLICY.2009.32"},{"key":"20_CR32","doi-asserted-by":"publisher","unstructured":"Karimi, L., Abdelhakim, M., Joshi, J.: Adaptive ABAC policy learning: a reinforcement learning approach (2021). https:\/\/doi.org\/10.48550\/arXiv.2105.08587","DOI":"10.48550\/arXiv.2105.08587"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Kolmogoroff, A.: Grundbegriffe der wahrscheinlichkeitsrechnung (1933)","DOI":"10.1007\/978-3-642-49888-6"},{"key":"20_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-319-07076-6_6","volume-title":"Risk Assessment and Risk-Driven Testing","author":"L Krautsevich","year":"2014","unstructured":"Krautsevich, L., Lazouski, A., Martinelli, F., Yautsiukhin, A.: Towards attribute-based access control policy engineering using risk. In: Bauer, T., Gro\u00dfmann, J., Seehusen, F., St\u00f8len, K., Wendland, M.-F. (eds.) RISK 2013. LNCS, vol. 8418, pp. 80\u201390. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07076-6_6"},{"key":"20_CR35","unstructured":"Lacoste, A., Oreshkin, B., Chung, W., Boquet, T., Rostamzadeh, N., Krueger, D.: Uncertainty in multitask transfer learning. arXiv preprint arXiv:1806.07528 (2018)"},{"key":"20_CR36","doi-asserted-by":"publisher","unstructured":"Liu, A., Du, X., Wang, N.: Efficient access control permission decision engine based on machine learning. Secur. Commun. Networks 2021, e3970485 (2021). https:\/\/doi.org\/10.1155\/2021\/3970485","DOI":"10.1155\/2021\/3970485"},{"key":"20_CR37","doi-asserted-by":"publisher","unstructured":"LIU, J.S.: Peskun\u2019s theorem and a modified discrete-state Gibbs sampler. Biometrika 83(3), 681\u2013682 (1996). https:\/\/doi.org\/10.1093\/biomet\/83.3.681","DOI":"10.1093\/biomet\/83.3.681"},{"key":"20_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L de Moura","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24"},{"key":"20_CR39","volume-title":"Probabilistic Machine Learning: An Introduction","author":"KP Murphy","year":"2022","unstructured":"Murphy, K.P.: Probabilistic Machine Learning: An Introduction. MIT Press, Cambridge (2022)"},{"key":"20_CR40","volume-title":"Probabilistic Machine Learning: Advanced Topics","author":"KP Murphy","year":"2023","unstructured":"Murphy, K.P.: Probabilistic Machine Learning: Advanced Topics. MIT Press, Cambridge (2023)"},{"key":"20_CR41","doi-asserted-by":"publisher","unstructured":"Newcombe, R.A., Lovegrove, S.J., Davison, A.J.: DTAM: dense tracking and mapping in real-time. In: Proceedings of the 2011 International Conference on Computer Vision. ICCV \u201911, USA, pp. 2320\u20132327. IEEE Computer Society (2011). https:\/\/doi.org\/10.1109\/ICCV.2011.6126513","DOI":"10.1109\/ICCV.2011.6126513"},{"key":"20_CR42","doi-asserted-by":"publisher","unstructured":"Nobi, M.N., Gupta, M., Praharaj, L., Abdelsalam, M., Krishnan, R., Sandhu, R.: Machine Learning in Access Control: A Taxonomy and Survey (2022). https:\/\/doi.org\/10.48550\/arXiv.2207.01739","DOI":"10.48550\/arXiv.2207.01739"},{"key":"20_CR43","doi-asserted-by":"publisher","unstructured":"Nobi, M.N., Krishnan, R., Huang, Y., Sandhu, R.: Administration of\u00a0machine learning based access control. In: Atluri, V., Di\u00a0Pietro, R., Jensen, C.D., Meng, W. (eds.) Computer Security \u2013 ESORICS 2022. LNCS, vol. 13555, pp. 189\u2013210. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17146-8_10","DOI":"10.1007\/978-3-031-17146-8_10"},{"key":"20_CR44","doi-asserted-by":"publisher","unstructured":"Nobi, M.N., Krishnan, R., Huang, Y., Shakarami, M., Sandhu, R.: Toward deep learning based access control. In: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy.. CODASPY \u201922, pp. 143\u2013154 Association for Computing Machinery (2022). https:\/\/doi.org\/10.1145\/3508398.3511497","DOI":"10.1145\/3508398.3511497"},{"key":"20_CR45","doi-asserted-by":"publisher","unstructured":"Nobi, M.N., Krishnan, R., Huang, Y., Shakarami, M., Sandhu, R.: Toward Deep learning based access control. In: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, pp. 143\u2013154 (2022). https:\/\/doi.org\/10.1145\/3508398.3511497","DOI":"10.1145\/3508398.3511497"},{"key":"20_CR46","doi-asserted-by":"publisher","unstructured":"Phan, D., Pradhan, N., Jankowiak, M.: Composable effects for flexible and accelerated probabilistic programming in NumPyro (2019). https:\/\/doi.org\/10.48550\/arXiv.1912.11554","DOI":"10.48550\/arXiv.1912.11554"},{"issue":"4","key":"20_CR47","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/2580723.2580730","volume":"57","author":"F Roesner","year":"2014","unstructured":"Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88\u201396 (2014). https:\/\/doi.org\/10.1145\/2580723.2580730","journal-title":"Commun. ACM"},{"key":"20_CR48","doi-asserted-by":"publisher","unstructured":"Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201914, pp. 1169\u20131181. Association for Computing Machinery (2014). https:\/\/doi.org\/10.1145\/2660267.2660319, event-place: New York, NY, USA","DOI":"10.1145\/2660267.2660319"},{"key":"20_CR49","doi-asserted-by":"publisher","unstructured":"Saad, F.A., Rinard, M.C., Mansinghka, V.K.: SPPL: probabilistic programming with fast exact symbolic inference. In: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation. PLDI 2021, pp. 804\u2013819. Association for Computing Machinery (2021). https:\/\/doi.org\/10.1145\/3453483.3454078","DOI":"10.1145\/3453483.3454078"},{"key":"20_CR50","doi-asserted-by":"publisher","unstructured":"Sinclair, S., Smith, S.W.: Preventative directions for insider threat mitigation via access control. In: Stolfo, S.J., Bellovin, S.M., Keromytis, A.D., Hershkop, S., Smith, S.W., Sinclair, S. (eds.) Insider Attack and Cyber Security: Beyond the Hacker. AIC, pp. 165\u2013194. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-77322-3_10","DOI":"10.1007\/978-0-387-77322-3_10"},{"key":"20_CR51","doi-asserted-by":"publisher","unstructured":"Templeman, R., Korayem, M., Crandall, D., Kapadia, A.: PlaceAvoider: Steering first-person cameras away from sensitive spaces. In: Proceedings 2014 Network and Distributed System Security Symposium. Internet Society (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23014, https:\/\/www.ndss-symposium.org\/ndss2014\/programme\/placeavoider-steering-first-person-cameras-away-sensitive-spaces\/, event-place: San Diego, CA","DOI":"10.14722\/ndss.2014.23014"},{"key":"20_CR52","doi-asserted-by":"publisher","unstructured":"Torres-Sospedra, J., et al.: UJIIndoorLoc: a new multi-building and multi-floor database for WLAN fingerprint-based indoor localization problems. In: 2014 International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 261\u2013270 (2014). https:\/\/doi.org\/10.1109\/IPIN.2014.7275492","DOI":"10.1109\/IPIN.2014.7275492"},{"key":"20_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-662-46666-7_7","volume-title":"Principles of Security and Trust","author":"F Turkmen","year":"2015","unstructured":"Turkmen, F., den Hartog, J., Ranise, S., Zannone, N.: Analysis of XACML policies with SMT. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 115\u2013134. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46666-7_7"},{"key":"20_CR54","unstructured":"Zhou, G.: Mixed Bamiltonian monte Carlo for mixed discrete and continuous variables (2020)"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-65633-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T07:07:58Z","timestamp":1721891278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-65633-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031656323","9783031656330"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-65633-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Aided Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cav2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/i-cav.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}