{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:41:23Z","timestamp":1743025283610,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_15","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"233-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Introducing Probabilities in Controller Strategies"],"prefix":"10.1007","author":[{"given":"Jerry","family":"den\u00a0Hartog","sequence":"first","affiliation":[]},{"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-45605-8_3","volume-title":"Process Algebra and Probabilistic Methods. Performance Modeling and Verification","author":"A Aldini","year":"2002","unstructured":"Aldini, A., Gorrieri, R.: Security analysis of a probabilistic non-repudiation protocol. In: Hermanns, H., Segala, R. (eds.) PROBMIV 2002, PAPM-PROBMIV 2002, and PAPM 2002. LNCS, vol. 2399, pp. 17\u201336. Springer, Heidelberg (2002)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-48778-6_7","volume-title":"Formal Methods for Real-Time and Probabilistic Systems","author":"S Andova","year":"1999","unstructured":"Andova, S.: Process algebra with probabilistic choice. In: Katoen, J.-P. (ed.) AMAST-ARTS 1999, ARTS 1999, and AMAST-WS 1999. LNCS, vol. 1601, pp. 111\u2013129. Springer, Heidelberg (1999)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-63166-6_14","volume-title":"Computer Aided Verification","author":"C Baier","year":"1997","unstructured":"Baier, C., Hermanns, H.: Weak bisimulation for fully probabilistic processes. In: Grumberg, O. (ed.) Computer Aided Verification. LNCS, pp. 119\u2013130. Springer, Heidelberg (1997)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L.: Policy framings for access control. In: Proceedings of the 2005 Workshop on Issues in the Theory of Security, pp. 5\u201311. ACM (2005)","DOI":"10.1145\/1045405.1045407"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-28641-4_17","volume-title":"Principles of Security and Trust","author":"D Basin","year":"2012","unstructured":"Basin, D., Jug\u00e9, V., Klaedtke, F., Z\u0103linescu, E.: Enforceable security policies revisited. In: Degano, P., Guttman, J.D. (eds.) Principles of Security and Trust. LNCS, vol. 7215, pp. 309\u2013328. Springer, Heidelberg (2012)"},{"key":"15_CR6","unstructured":"Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Cervesato, I. (ed.) Foundations of Computer Security: proceedings of the FLoC 2002 workshop on Foundations of Computer Security, pp. 95\u2013104. DIKU Technical Report (2002)"},{"issue":"1\u20132","key":"15_CR7","first-page":"2","volume":"4","author":"L Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1\u20132), 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-19125-1_6","volume-title":"Engineering Secure Software and Systems","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Predictability of enforcement. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 73\u201386. Springer, Heidelberg (2011)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-44804-7_12","volume-title":"Proceedings of the Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification","author":"P Buchholz","year":"2001","unstructured":"Buchholz, P., Kemper, P.: Quantifying the dynamic behavior of process algebras. In: de Alfaro, L., Gilmore, S. (eds.) Proceedings of the Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification. LNCS, vol. 2165, pp. 184\u2013199. Springer, Heidelberg (2001)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-38004-4_3","volume-title":"Security and Trust Management","author":"G Caravagna","year":"2013","unstructured":"Caravagna, G., Costa, G., Pardini, G.: Lazy security controllers. In: J\u00f8sang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 33\u201348. Springer, Heidelberg (2013)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-319-05302-8_11","volume-title":"Foundations and Practice of Security","author":"V Ciancia","year":"2014","unstructured":"Ciancia, V., Martinelli, F., Ilaria, M., Morisset, C.: Quantitative evaluation of enforcement strategies: position paper. In: Danger, J.-L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Heywood, N.Z. (eds.) FPS 2013. LNCS, vol. 8352, pp. 178\u2013186. Springer, Heidelberg (2014)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38004-4_1","volume-title":"Security and Trust Management","author":"P Dr\u00e1bik","year":"2013","unstructured":"Dr\u00e1bik, P., Martinelli, F., Morisset, C.: Cost-aware runtime enforcement of security policies. In: J\u00f8sang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 1\u201316. Springer, Heidelberg (2013)"},{"key":"15_CR13","unstructured":"Easwaran, A., Kannan, S., Lee, I.: Optimal control of software ensuring safety and functionality. Technical report MS-CIS-05-20, University of Pennsylvania (2005)"},{"key":"15_CR14","first-page":"130","volume":"121","author":"RV Glabbeek","year":"1990","unstructured":"Glabbeek, R.V., Smolka, S., Steffen, B.: Reactive, generative and stratified models of probabilistic processes. Inform. Comput. 121, 130\u2013141 (1990)","journal-title":"Inform. Comput."},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/S1571-0661(05)82521-6","volume":"22","author":"JI den Hartog","year":"1999","unstructured":"den Hartog, J.I., de Vink, E.P.: Mixing up nondeterminism and probability: a preliminary report. Electr. Notes Theor. Comput. Sci. 22, 88\u2013110 (1999)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"15_CR16","volume-title":"Communicating Sequential Processes","author":"C Hoare","year":"1985","unstructured":"Hoare, C.: Communicating Sequential Processes, vol. 178. Prentice-hall, Englewood Cliffs (1985)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/11555827_21","volume-title":"Computer Security \u2013 ESORICS 2005","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.W.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355\u2013373. Springer, Heidelberg (2005)"},{"key":"15_CR19","unstructured":"Lowe, G.: Representing nondeterminism and probabilistic behaviour in reactive processes. Technical report PRG-TR-11-93, Oxforf University Computing Laboratory (1993)"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-41098-7_10","volume-title":"Security and Trust Management","author":"Y Mallios","year":"2013","unstructured":"Mallios, Y., Bauer, L., Kaynar, D., Martinelli, F., Morisset, C.: Probabilistic cost enforcement of security policies. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol. 8203, pp. 144\u2013159. Springer, Heidelberg (2013)"},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1016\/S0304-3975(02)00596-0","volume":"290","author":"F Martinelli","year":"2003","unstructured":"Martinelli, F.: Analysis of security protocols as open systems. Theor. Comput. Sci. 290(1), 1057\u20131106 (2003)","journal-title":"Theor. Comput. Sci."},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.entcs.2006.08.029","volume":"179","author":"F Martinelli","year":"2007","unstructured":"Martinelli, F., Matteucci, I.: Through modeling to synthesis of security automata. Electr. Notes Theor. Comput. Sci. 179, 31\u201346 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"issue":"8","key":"15_CR23","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1002\/stvr.441","volume":"22","author":"F Martinelli","year":"2012","unstructured":"Martinelli, F., Matteucci, I.: A framework for automatic generation of security controller. Softw. Test. Verif. Reliab. 22(8), 563\u2013582 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Morisset, C.: Quantitative access control with partially-observable markov decision processes. In: Proceedings of CODASPY 2012, pp. 169\u2013180. ACM (2012)","DOI":"10.1145\/2133601.2133623"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Molloy, I., Dickens, L., Morisset, C., Cheng, P.C., Lobo, J., Russo, A.: Risk-based security decisions under uncertainty. In: Proceedings of CODASPY 2012, pp. 157\u2013168. ACM (2012)","DOI":"10.1145\/2133601.2133622"},{"issue":"1","key":"15_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"15_CR27","unstructured":"Segala, R.: Modeling and verification of randomized distributed real-time systems. Ph.D. thesis, Massachusetts Institute of Technology (1995)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T02:21:58Z","timestamp":1717813318000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}