{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:05:24Z","timestamp":1743044724889,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319082592"},{"type":"electronic","value":"9783319082608"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08260-8_6","type":"book-chapter","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T07:13:31Z","timestamp":1403594011000},"page":"85-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Developing and Enforcing Policies for Access Control, Resource Usage, and Adaptation"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Margheri","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Masi","sequence":"additional","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Tiezzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"key":"6_CR1","unstructured":"NIST: a survey of access control models (2009). http:\/\/csrc.nist.gov\/news_events\/privilege-management-workshop\/PvM-Model-Survey-Aug26-2009.pdf"},{"key":"6_CR2","unstructured":"OASIS XACML TC: eXtensible Access Control Markup Language (XACML) version 3.0 - Candidate OASIS Standard, September 2012"},{"key":"6_CR3","unstructured":"The epSOS project: a european ehealth project. http:\/\/www.epsos.eu"},{"key":"6_CR4","unstructured":"The Nationwide Health Information Network (NHIN): an American eHealth Project (2009). http:\/\/healthit.hhs.gov\/portal\/server.pt"},{"key":"6_CR5","unstructured":"OASIS: Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of XACML v2.0 for Healthcare v1.0 (2009)"},{"key":"6_CR6","unstructured":"OASIS Security Services TC: assertions and protocols for the OASIS security assertion markup language (SAML) v2.02 (2005)"},{"key":"6_CR7","unstructured":"Margheri, A., Masi, M., Pugliese, R., Tiezzi, F.: A formal software engineering approach to policy-based access control. Technical report, DiSIA, Univ. Firenze (2013). http:\/\/rap.dsi.unifi.it\/facpl\/research\/Facpl-TR.pdf"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800\u2013145 (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"9","key":"6_CR9","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/JPROC.2004.832969","volume":"92","author":"DC Verma","year":"2004","unstructured":"Verma, D.C.: Service level agreements on IP networks. Proc. IEEE 92(9), 1382\u20131388 (2004)","journal-title":"Proc. IEEE"},{"key":"6_CR10","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E.: The X-CREATE framework - a comparison of XACML policy testing strategies. In: WEBIST. SciTePress, pp. 155\u2013160 (2012)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-28166-2_7","volume-title":"Engineering Secure Software and Systems","author":"M Masi","year":"2012","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and implementation of the XACML access control mechanism. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 60\u201374. Springer, Heidelberg (2012)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Busch, M., Koch, N., Masi, M., Pugliese, R., Tiezzi, F.: Towards model-driven development of access control policies for web applications. In: MDsec. ACM (2012)","DOI":"10.1145\/2422498.2422502"},{"key":"6_CR13","unstructured":"Margheri, A., Masi, M., Pugliese, R., Tiezzi, F.: On a formal and user-friendly linguistic approach to access control of electronic health data. In: HEALTHINF. SciTePress (2013)"},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2011.09.004","volume":"78","author":"N Khakpour","year":"2012","unstructured":"Khakpour, N., Jalili, S., Talcott, C.L., Sirjani, M., Mousavi, M.R.: Formal modeling of evolving self-adaptive systems. Sci. Comput. Program. 78(1), 3\u201326 (2012)","journal-title":"Sci. Comput. Program."},{"key":"6_CR15","unstructured":"IBM: autonomic computing policy language - ACPL. http:\/\/www.ibm.com\/developerworks\/tivoli\/tutorials\/ac-spl\/"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"issue":"4","key":"6_CR17","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/BF02283186","volume":"2","author":"M Sloman","year":"1994","unstructured":"Sloman, M.: Policy driven management for distributed systems. J. Netw. Syst. Manage. 2(4), 333\u2013360 (1994)","journal-title":"J. Netw. Syst. Manage."},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Kolovski, V., Hendler, J.A., Parsia, B.: Analyzing web access control policies. In: WWW, pp. 677\u2013686. ACM (2007)","DOI":"10.1145\/1242572.1242664"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Bryans, J.: Reasoning about XACML policies using CSP. In: SWS, pp. 28\u201335. ACM (2005)","DOI":"10.1145\/1103022.1103028"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: ICSE, pp. 196\u2013205. ACM (2005)","DOI":"10.1145\/1062455.1062502"},{"key":"6_CR21","unstructured":"Proctor, S.: SUN XACML (2011). http:\/\/sunxacml.sf.net"},{"key":"6_CR22","unstructured":"The Herasaf consortium $$\\rm HERAS^{AF}$$. http:\/\/www.herasaf.org"},{"key":"6_CR23","unstructured":"Axiomatics: Axiomatics Language for Authorization (ALFA). http:\/\/www.axiomatics.com\/axiomatics-alfa-plugin-for-eclipse.html"}],"container-title":["Lecture Notes in Computer Science","Web Services and Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08260-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T23:58:59Z","timestamp":1675814339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08260-8_6"}},"subtitle":["\u2013 A Practical Approach \u2013"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319082592","9783319082608"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08260-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}