{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:59:41Z","timestamp":1761947981308,"version":"3.40.4"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_30","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:55:03Z","timestamp":1402419303000},"page":"340-351","source":"Crossref","is-referenced-by-count":5,"title":["Nudging for Quantitative Access Control Systems"],"prefix":"10.1007","author":[{"given":"Charles","family":"Morisset","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Gro\u00df","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]},{"given":"Iryna","family":"Yevseyeva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1512\/iumj.1957.6.56038","volume":"6","author":"R. Bellman","year":"1957","unstructured":"Bellman, R.: A markovian decision process. In. Univ. Math. J.\u00a06, 679\u2013684 (1957)","journal-title":"In. Univ. Math. J."},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Bruns, G., Huth, M.: Access-control policies via belnap logic: Effective and efficient composition and analysis. In: Proc. of CSF 2008, pp. 163\u2013176 (2008)","DOI":"10.1109\/CSF.2008.10"},{"key":"30_CR3","unstructured":"Bundy, A., Grov, G., Jones, C.: Learning from experts to aid the automation of proof search. In: AVoCS 2009, vol. CSR-2-2009, pp. 229\u2013232 (September 2009)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: Proceedings of S&P 2007, pp. 222\u2013230. IEEE (2007)","DOI":"10.1109\/SP.2007.21"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-319-07668-3_23","volume-title":"DUXU 2014","author":"L. Coventry","year":"2014","unstructured":"Coventry, L., Briggs, P., Jeske, D., van Moorsel, A.: SCENE: A structured means for creating and evaluating behavioral nudges in a cyber security environment. In: Marcus, A. (ed.) DUXU 2014, Part I. LNCS, vol.\u00a08517, pp. 229\u2013239. Springer, Heidelberg (2014)"},{"key":"30_CR6","unstructured":"Crampton, J., Huth, M., Kuo, J., Morisset, C.: Policy-based access control from numerical evidence. Technical Report 2013\/6, Imperial College London, Department of Computing (October 2013)"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-28641-4_21","volume-title":"Principles of Security and Trust","author":"J. Crampton","year":"2012","unstructured":"Crampton, J., Morisset, C.: PTaCL: A language for attribute-based access control in open systems. In: Degano, P., Guttman, J.D. (eds.) Principles of Security and Trust. LNCS, vol.\u00a07215, pp. 390\u2013409. Springer, Heidelberg (2012)"},{"issue":"1","key":"30_CR8","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.joep.2011.10.009","volume":"33","author":"P. Dolan","year":"2012","unstructured":"Dolan, P., Hallsworth, M., Halpern, D., King, D., Metcalfe, R., Vlaev, I.: Influencing behaviour: The mindspace way. Journal of Economic Psychology\u00a033(1), 264\u2013277 (2012)","journal-title":"Journal of Economic Psychology"},{"key":"30_CR9","unstructured":"Ferraiolo, D.F., Kuhn, D.R.: Role-based access control. In: Proceedings of the 15th National Computer Security Conference, pp. 554\u2013563 (1992)"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-319-06410-9_20","volume-title":"FM 2014: Formal Methods","author":"L. Freitas","year":"2014","unstructured":"Freitas, L., Whiteside, I.: Proof Patterns for Formal Methods. In: Jones, C., Pihlajasaari, P., Sun, J. (eds.) FM 2014. LNCS, vol.\u00a08442, pp. 279\u2013295. Springer, Heidelberg (2014)"},{"key":"30_CR11","unstructured":"Huth, M., Kuo, J.: PEALT: A reasoning tool for numerical aggregation of trust evidence. Technical Report 2013\/7, Imperial College London, Department of Computing (October 2013) ISSN 1469-4166 (Print), ISSN 1469-4174 (Online)"},{"key":"30_CR12","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of ACSC 2006, Darlinghurst, Australia, pp. 85\u201394 (2006)"},{"issue":"4","key":"30_CR13","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1023\/A:1011219731903","volume":"8","author":"A. J\u00f8sang","year":"2000","unstructured":"J\u00f8sang, A., Bondi, V.: Legal reasoning with subjective logic. Artificial Intelligence and Law\u00a08(4), 289\u2013315 (2000)","journal-title":"Artificial Intelligence and Law"},{"key":"30_CR14","unstructured":"Lampson, B.: Protection. In: Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, pp. 437\u2013443. Princeton University (1971)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Morisset, C.: Quantitative access control with partially-observable markov decision processes. In: CODASPY 2012, pp. 169\u2013180. ACM (2012)","DOI":"10.1145\/2133601.2133623"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Molloy, I., Cheng, P.-C., Rohatgi, P.: Trading in risk: Using markets to improve access control. In: NSPW (2008)","DOI":"10.1145\/1595676.1595694"},{"key":"30_CR17","first-page":"157","volume-title":"Proceedings of CODASPY 2012","author":"I. Molloy","year":"2012","unstructured":"Molloy, I., Dickens, L., Morisset, C., Cheng, P.-C., Lobo, J., Russo, A.: Risk-based security decisions under uncertainty. In: Proceedings of CODASPY 2012, pp. 157\u2013168. ACM, New York (2012)"},{"key":"30_CR18","unstructured":"Moses, T.: eXtensible Access Control Markup Language TC v2.0, XACML (2005)"},{"issue":"11","key":"30_CR19","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1046\/j.1525-1497.2003.20928.x","volume":"18","author":"A. Moxey","year":"2003","unstructured":"Moxey, A., O\u2019Connell, D., McGettigan, P., Henry, D.: Describing treatment effects to patients. Journal of General Internal Medicine\u00a018(11), 948\u2013959 (2003)","journal-title":"Journal of General Internal Medicine"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E., Lobo, J.: D-algebra for composing access control policy decisions. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS, pp. 298\u2013309. ACM (2009)","DOI":"10.1145\/1533057.1533097"},{"key":"30_CR21","first-page":"75","volume-title":"Proceedings of SACMAT 2009","author":"Q. Ni","year":"2009","unstructured":"Ni, Q., Lobo, J., Calo, S., Rohatgi, P., Bertino, E.: Automating role-based provisioning by learning from examples. In: Proceedings of SACMAT 2009, pp. 75\u201384. ACM, New York (2009)"},{"key":"30_CR22","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) Version 3.0, Committee Specification 01 (2010)"},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Rao, P., Lin, D., Bertino, E., Li, N., Lobo, J.: An algebra for fine-grained integration of xacml policies. In: Proceedings of SACMAT 2009, pp. 63\u201372 (2009)","DOI":"10.1145\/1542207.1542218"},{"key":"30_CR24","unstructured":"Thaler, R., Sunstein, C.: Nudge: Improving Decisions about Health, Wealth, and Happiness. Yale University Press (2008)"},{"issue":"4481","key":"30_CR25","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1126\/science.7455683","volume":"211","author":"A. Tversky","year":"1981","unstructured":"Tversky, A., Kahneman, D.: The framing of decisions and the psychology of choice. Science\u00a0211(4481), 453\u2013458 (1981)","journal-title":"Science"},{"key":"30_CR26","doi-asserted-by":"crossref","unstructured":"Voronkov, A.: Easychair. In: Kovacs, L., Kutsia, T. (eds.) WWV 2010. EPiC Series, vol.\u00a018, p. 2. EasyChair (2013)","DOI":"10.29007\/n94r"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:06:09Z","timestamp":1746263169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}