{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T06:10:01Z","timestamp":1748585401580,"version":"3.41.0"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319232003"},{"type":"electronic","value":"9783319232010"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23201-0_55","type":"book-chapter","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T11:57:35Z","timestamp":1440676655000},"page":"547-556","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Exchange Policies at an Organisational Level : Formal Expression and Analysis"],"prefix":"10.1007","author":[{"given":"Claire","family":"Saurel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,28]]},"reference":[{"key":"55_CR1","unstructured":"Abou El Kalam, A., Benferhat, S., Mi\u00e8ge, A., El Baida, R., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Lake Come, Italy, June 4\u20136, 2003"},{"key":"55_CR2","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Mi\u00e8ge, A.: H\u00e9ritage de privil\u00e8ges dans le mod\u00e8le Or-BAC : application dans un environnement r\u00e9seau. In: SSTIC 2004 : Symposium sur la S\u00e9curit\u00e9 des Technologies de l\u2019information et des Communications (2004)"},{"key":"55_CR3","unstructured":"Feldmeier, C.J.: Limiting hierarchical inheritance of permissions in access control models. In: ISA 767 Secure Electronic Commerce (2006)"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Crampton, J.: On permissions, inheritance and role hierarchies. In: 10th ACM Conference on Computer and Communication Security (2003)","DOI":"10.1145\/948109.948123"},{"key":"55_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-38709-8_19","volume-title":"Advanced Information Systems Engineering","author":"R Delmas","year":"2013","unstructured":"Delmas, R., Polacsek, T.: Formal methods for exchange policy specification. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 288\u2013303. Springer, Heidelberg (2013)"},{"key":"55_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1023\/A:1021884118023","volume":"6","author":"O Pacheco","year":"2003","unstructured":"Pacheco, O., Carmo, J.: A Role Based Model for the normative specification of organized collective agency and agent interaction. Journal of Autonomous Agents and Multi-Agent Systems 6, 145\u2013184 (2003)","journal-title":"Journal of Autonomous Agents and Multi-Agent Systems"},{"key":"55_CR7","unstructured":"Glassey, O., Chappelet, J.L.: Comparaison de trois techniques de mod\u00e9lisation de processus : ADONIS, OSSAD et UML. Working paper of l\u2019IDHEAP\/14, UER Management public-Syst\u00e8mes d\u2019informations, Lausanne (2002)"},{"issue":"2","key":"55_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"55_CR9","unstructured":"Cholvy, L., Garion, C., Saurel, C.: Information sharing policies for coalition systems. In: NATO RTO-IST Symposium on Dynamic Communications management, Budapest, October 2006"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Cholvy, L., Saurel, C., Carr\u00e8re, J.: Merging regulations: analysis of a practical example. In: Data and Knowledge Fusion, Special issue of International Journal of Intelligent Systems, vol. 16. J. Wiley and Sons Pub. (2001)","DOI":"10.1002\/int.1057"},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"Cholvy, L., Cuppens, F.: Analyzing Consistency of Security Policies. IEEE Symposium on Security and Privacy, pp. 103\u2013112 (1997)","DOI":"10.1109\/SECPRI.1997.601324"}],"container-title":["Communications in Computer and Information Science","New Trends in Databases and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23201-0_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:45:38Z","timestamp":1748583938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23201-0_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319232003","9783319232010"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23201-0_55","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}