{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:11:36Z","timestamp":1756897896774,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319053011"},{"type":"electronic","value":"9783319053028"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05302-8_14","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:24Z","timestamp":1395325884000},"page":"227-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Armando","sequence":"first","affiliation":[]},{"given":"Sander","family":"Oudkerk","sequence":"additional","affiliation":[]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[]},{"given":"Konrad","family":"Wrona","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/69.991718","volume":"14","author":"NR Adam","year":"2002","unstructured":"Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: A content-based authorization model for digital libraries. IEEE Trans. Knowl. Data Eng. 14(2), 296\u2013315 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"14_CR2","unstructured":"Ans\u00f3tegui, C., Bofill, M., Palah\u00ed, M., Suy, J., Villaret, M.: Satisfiability modulo theories: an efficient approach for the resource-constrained project scheduling problem. In: SARA, AAAI (2011)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Arkoudas, K., Loeb, S., Chadha, R., Chiang, J., Whittaker, K.: Automated policy analysis. In: 2012 IEEE International Symposium on Policy, July 2012, pp. 1\u20138 (2012)","DOI":"10.1109\/POLICY.2012.11"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Armando, A., Grasso, M., Oudkerk, S., Ranise, S., Wrona, K.: Content-based information protection and release in NATO operations. In: SACMAT, ACM (2013)","DOI":"10.1145\/2462410.2462427"},{"key":"14_CR5","series-title":"LNCS","first-page":"25","volume-title":"DBSec 2012","author":"A Armando","year":"2012","unstructured":"Armando, A., Ranise, S.: Automated and efficient analysis of role-based access control with attributes. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 25\u201340. Springer, Heidelberg (2012)"},{"issue":"6","key":"14_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MIS.2006.117","volume":"21","author":"B Beckert","year":"2006","unstructured":"Beckert, B., Hoare, C.A.R., H\u00e4hnle, R., Smith, R., Green, D.R., Ranise, S., Tinelli, C., Ball, T., Rajamani, S.K.: Intelligent systems and formal methods in software engineering. IEEE Int. Syst. 21(6), 71\u201381 (2006)","journal-title":"IEEE Int. Syst."},{"key":"14_CR7","unstructured":"Bell, D.E., La Padula, L.J.: Secure computer systems: mathematical foundations. Technical report MTR-2547, MITRE Corporation, Bedford (1973)"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM TISSEC 6(1), 71\u2013127 (2003)","journal-title":"ACM TISSEC"},{"issue":"1","key":"14_CR9","first-page":"146","volume":"1","author":"S Ceri","year":"1989","unstructured":"Ceri, S., Gottlob, G., Tanca, L.: What you always wanted to know about datalog (and never dared to ask). IEEE TKDE 1(1), 146\u2013166 (1989)","journal-title":"IEEE TKDE"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. TISSEC 5(2), 169\u2013202 (2002)","journal-title":"TISSEC"},{"issue":"2","key":"14_CR11","first-page":"94","volume":"3","author":"S De Capitani di Vimercati","year":"2007","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P.: Access control policies and languages. Int. J. Comput. Sci. Eng. 3(2), 94\u2013102 (2007)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1995376.1995394","volume":"54","author":"L De Moura","year":"2011","unstructured":"De Moura, L., Bj\u00f8rner, N.: Satisfiability modulo theories: introduction and applications. CACM 54, 69\u201377 (2011)","journal-title":"CACM"},{"key":"14_CR13","series-title":"LNCS","first-page":"41","volume-title":"DBSec 2012","author":"X Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 41\u201355. Springer, Heidelberg (2012)"},{"issue":"7","key":"14_CR14","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. CACM 19(7), 385\u2013394 (1976)","journal-title":"CACM"},{"key":"14_CR15","unstructured":"Casassa Mont, M., Balacheff, B.: On device-based identity management in enterprises. Technical report HPL-2007-53, Helwett-Packard Laboratories (2007)"},{"key":"14_CR16","unstructured":"Nato HQ C3 Staff. Directive on the marking of NATO information (2011)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"NATO Security Committee. Primary directive on INFOSEC. Number AC\/35-D\/2004-REV2 (2010)","DOI":"10.1016\/S1353-4858(04)00137-0"},{"key":"14_CR18","unstructured":"North Atlantic Council. Security within the North Atlantic Treaty Organization. Number C-M(2002) 49 (2002)"},{"key":"14_CR19","unstructured":"North Atlantic Council. Primary directive on information management. Number C-M(2008) 0113(INV) (2008)"},{"key":"14_CR20","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) version 3.0. (2010)"},{"key":"14_CR21","unstructured":"Oudkerk, S., Bryant, I., Eggen, A., Haakseth, R.: A proposal for an XML confidentiality label syntax and binding of metadata to data objects. In: NATO RTO Symposium on Information, Assurance and Cyber Defence (2010)"},{"key":"14_CR22","series-title":"LNCS (LNAI)","first-page":"332","volume-title":"ICCS 1997","author":"S Prediger","year":"1997","unstructured":"Prediger, S.: Logical scaling in formal concept analysis. In: Delugach, H.S., Keeler, M.A., Searle, L., Lukose, D., Sowa, J.F. (eds.) ICCS 1997. LNCS (LNAI), vol. 1257, pp. 332\u2013341. Springer, Heidelberg (1997)"},{"key":"14_CR23","series-title":"LNCS (LNAI)","first-page":"48","volume-title":"FroCos 2005","author":"S Ranise","year":"2005","unstructured":"Ranise, S., Ringeissen, C., Zarba, C.G.: Combining data structures with nonstably infinite theories using many-sorted logic. In: Gramlich, B. (ed.) FroCos 2005. LNCS (LNAI), vol. 3717, pp. 48\u201364. Springer, Heidelberg (2005)"},{"key":"14_CR24","unstructured":"Ranise, S., Tinelli, C.: The SMT-LIB standard: version 1.2. http:\/\/www.smt-lib.org (2006)"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-94-009-7798-3_15","volume-title":"Ordered Sets","author":"R Wille","year":"1982","unstructured":"Wille, R.: Restructuring lattice theory: an approach based on hierarchies of concepts. In: Rival, I. (ed.) Ordered Sets, pp. 445\u2013470. Reidel, Dordrecht (1982)"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Wrona, K., Hallingstad, G.: Controlled information sharing in NATO operations. In: IEEE Military Communications Conference (MILCOM) (2011)","DOI":"10.1109\/MILCOM.2011.6127479"},{"key":"14_CR27","unstructured":"Yices. http:\/\/yices.csl.sri.com (2013)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Yuan, E., Jin, T.: Attribute-based access control (ABAC) for web services. In: IEEE International Conference on Web Services, pp. 561\u2013569 (2005)","DOI":"10.1109\/ICWS.2005.25"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05302-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:15:50Z","timestamp":1676376950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05302-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319053011","9783319053028"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05302-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}