{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:09:58Z","timestamp":1725804598628},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_10","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T10:55:22Z","timestamp":1410000922000},"page":"146-161","source":"Crossref","is-referenced-by-count":5,"title":["ALPS: An Action Language for Policy Specification and Automated Safety Analysis"],"prefix":"10.1007","author":[{"given":"Silvio","family":"Ranise","sequence":"first","affiliation":[]},{"given":"Riccardo","family":"Traverso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"457","DOI":"10.2178\/bsl\/1294171129","volume":"16","author":"P.A. Abdulla","year":"2010","unstructured":"Abdulla, P.A.: Well (and better) quasi-ordered transition systems. Bulletin of Symbolic Logic\u00a016(4), 457\u2013515 (2010)","journal-title":"Bulletin of Symbolic Logic"},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R. Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Theoretical Computer Science\u00a0126(2), 183\u2013235 (1994)","journal-title":"Theoretical Computer Science"},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1805974.1805976","volume":"13","author":"M.Y. Becker","year":"2010","unstructured":"Becker, M.Y., Nanz, S.: A Logic for State-Modifying Authorization Policies. ACM Trans. on Info. and Sys. Sec.\u00a013(3), 1\u201328 (2010)","journal-title":"ACM Trans. on Info. and Sys. Sec."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Boolos, G.S., Burgess, J.P., Jeffrey, R.C.: Computability and Logic. Cambridge University Press (2002)","DOI":"10.1017\/CBO9781139164931"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: 10th ACM SACMAT, pp. 38\u201347. ACM (2005)","DOI":"10.1145\/1063979.1063986"},{"issue":"2","key":"10_CR6","first-page":"94","volume":"3","author":"S. De Capitani di Vimercati","year":"2007","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P.: Access Control Policies and Languages. Int. J. of Comp. Science and Eng.\u00a03(2), 94\u2013102 (2007)","journal-title":"Int. J. of Comp. Science and Eng."},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0743-1066(84)90014-1","volume":"1","author":"W.F. Dowling","year":"1984","unstructured":"Dowling, W.F., Gallier, J.H.: Linear-time algorithms for testing the satisfiability of propositional horn formulae. J. of Logic Progr.\u00a01(3), 267\u2013284 (1984)","journal-title":"J. of Logic Progr."},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0004-3702(94)00080-K","volume":"76","author":"K. Erol","year":"1991","unstructured":"Erol, K., Nau, D.S., Subrahmanian, V.S.: Complexity, Decidability and Undecidability Results for Domain-Independent Planning: A Detailed Analysis. Artificial Intelligence\u00a076, 75\u201388 (1991)","journal-title":"Artificial Intelligence"},{"issue":"3","key":"10_CR9","first-page":"189","volume":"2","author":"R.E. Fikes","year":"1972","unstructured":"Fikes, R.E., Nilsson, N.J.: Strips: A new approach to the application of theorem proving to problem solving. Artificial Intelligence\u00a02(3), 189\u2013208 (1972)","journal-title":"Artificial Intelligence"},{"key":"10_CR10","volume-title":"Graduate Texts in Computer Science","author":"M. Fitting","year":"1996","unstructured":"Fitting, M.: First-Order Logic and Automated Theorem Proving. In: Graduate Texts in Computer Science, 2nd edn., Springer, Heidelberg (1996)","edition":"2"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-18275-4_14","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"R. Frohardt","year":"2011","unstructured":"Frohardt, R., Chang, B.-Y.E., Sankaranarayanan, S.: Access Nets: Modeling Access to Physical Spaces. In: Jhala, R., Schmidt, D. (eds.) VMCAI 2011. LNCS, vol.\u00a06538, pp. 184\u2013198. Springer, Heidelberg (2011)"},{"issue":"8","key":"10_CR12","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of ACM"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Lenzerini, M.: Class Hierarchies and Their Complexity. In: Advances in Database Programming Languages, pp. 43\u201365. ACM (1990)","DOI":"10.1145\/101620.101623"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Ranise, S., Traverso, R.: ALPS: An Action Language for Policy Specification and Automated Safety Analysis, Technical Report (2014), http:\/\/goo.gl\/vVPFKS","DOI":"10.1007\/978-3-319-11851-2_10"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Wang, Q., Li, N.: Satisfiability and Resiliency in Workflow Authorization Systems. ACM TISSEC\u00a013(4) (2010)","DOI":"10.1145\/1880022.1880034"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T04:08:16Z","timestamp":1598242096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}