{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:00:11Z","timestamp":1725868811773},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_19","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:37:01Z","timestamp":1477096621000},"page":"267-284","source":"Crossref","is-referenced-by-count":3,"title":["ASASPXL: New Clother for Analysing ARBAC Policies"],"prefix":"10.1007","author":[{"given":"Anh","family":"Truong","sequence":"first","affiliation":[]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"19_CR1","unstructured":"http:\/\/homes.di.unimi.it\/~ghilardi\/mcmt"},{"key":"19_CR2","unstructured":"http:\/\/research.microsoft.com\/en-us\/um\/redmond\/projects\/z3"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Alberti, F., Armando, A., Ranise, S.: Efficient symbolic automated analysis of administrative role-based access control policies. In: Proceeding of ASIACCS, pp. 165\u2013175. ACM Press (2011)","DOI":"10.1145\/1966913.1966935"},{"key":"19_CR4","series-title":"LNCS (LNAI)","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-22438-6_4","volume-title":"CADE 2011","author":"F Alberti","year":"2011","unstructured":"Alberti, F., Armando, A., Ranise, S.: ASASP: automated symbolic analysis of security policies. In: Bj\u00f8rner, N., Sofronie-Stokkermans, V. (eds.) CADE 2011. LNCS (LNAI), vol. 6803, pp. 26\u201333. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22438-6_4"},{"key":"19_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-22444-7_2","volume-title":"STM 2010","author":"A Armando","year":"2011","unstructured":"Armando, A., Ranise, S.: Automated symbolic analysis of ARBAC policies. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 17\u201334. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22444-7_2"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Crampton, J.: Understanding and developing role-based administrative models. In: Proceedings of 12th CCS, pp. 158\u2013167. ACM Press (2005)","DOI":"10.1145\/1102120.1102143"},{"issue":"2","key":"19_CR7","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1504\/IJCSE.2007.015739","volume":"3","author":"D Capitani","year":"2007","unstructured":"Capitani, D., di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P.: Access control policies and languages. Int. J. Comput. Sci. Eng. (IJCSE) 3(2), 94\u2013102 (2007)","journal-title":"Int. J. Comput. Sci. Eng. (IJCSE)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-319-08867-9_12","volume-title":"Computer Aided Verification","author":"AL Ferrara","year":"2014","unstructured":"Ferrara, A.L., Madhusudan, P., Nguyen, T.L., Parlato, G.: Vac - verifier of administrative role-based access control policies. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 184\u2013191. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-08867-9_12"},{"issue":"4","key":"19_CR9","first-page":"1","volume":"6","author":"S Ghilardi","year":"2010","unstructured":"Ghilardi, S., Ranise, S.: Backward reachability of array-based systems by SMT solving: termination and invariant synthesis. Logical Methods Comput. Sci. (LMCS) 6(4), 1\u201348 (2010)","journal-title":"Logical Methods Comput. Sci. (LMCS)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Jayaraman, K., Ganesh, V., Tripunitara, M., Rinard, M., Chapin, S.: Automatic error finding for access control policies. In: Proceedings of 18th CCS, pp. 163\u2013174. ACM (2011)","DOI":"10.1145\/2046707.2046727"},{"issue":"4","key":"19_CR11","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/TDSC.2007.70225","volume":"5","author":"S Jha","year":"2008","unstructured":"Jha, S., Li, N., Tripunitara, M.V., Wang, Q., Winsborough, H.: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Secure Comput. 5(4), 242\u2013255 (2008). IEEE","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"19_CR12","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"N Li","year":"2006","unstructured":"Li, N., Tripunitara, M.V.: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(4), 391\u2013420 (2006). ACM Press","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-38004-4_18","volume-title":"Security and Trust Management","author":"S Ranise","year":"2013","unstructured":"Ranise, S., Truong, A., Armando, A.: Boosting model checking to analyse large ARBAC policies. In: J\u00f8sang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 273\u2013288. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38004-4_18"},{"issue":"29","key":"19_CR14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"2","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youmann, C.: Role-based access control models. IEEE Comput. 2(29), 38\u201347 (1996). IEEE","journal-title":"IEEE Comput."},{"issue":"44","key":"19_CR15","doi-asserted-by":"crossref","first-page":"6208","DOI":"10.1016\/j.tcs.2011.05.009","volume":"412","author":"A Sasturkar","year":"2011","unstructured":"Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.: Policy analysis for administrative role-based access control. Theor. Comput. Sci. 412(44), 6208\u20136234 (2011). Elsevier","journal-title":"Theor. Comput. Sci."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Stoller, S.D., Yang, P., Ramakrishnan, C., Gofman, M.I.: Efficient policy analysis for administrative role-based access control. In: Proceedings of 14th CCS, pp. 445\u2013455. ACM Press (2007)","DOI":"10.1145\/1315245.1315300"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-39256-6_4","volume-title":"Data and Applications Security and Privacy XXVII","author":"P Yang","year":"2013","unstructured":"Yang, P., Gofman, M., Yang, Z.: Policy analysis for administrative role based access control without separate administration. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 49\u201364. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39256-6_4"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:47:39Z","timestamp":1568486859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}