{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:46:13Z","timestamp":1740098773441,"version":"3.37.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_5","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"89-108","source":"Crossref","is-referenced-by-count":0,"title":["Building a Fair System Using Access Rights"],"prefix":"10.1007","author":[{"given":"Nada","family":"Essaouini","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Pontual, M., Chowdhury, O., Winsborough, W.H., Yu, T., Irwin, K.: On the management of user obligations. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, pp. 175\u2013184. ACM, New York (2011). http:\/\/doi.acm.org\/10.1145\/1998441.1998473","DOI":"10.1145\/1998441.1998473"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 134\u2013143. ACM, New York (2006). http:\/\/doi.acm.org\/10.1145\/1180405.1180423","DOI":"10.1145\/1180405.1180423"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: Formal enforcement and management of obligation policies. Data Knowl. Eng. 71(1), 127\u2013147 (2012). http:\/\/dx.doi.org\/10.1016\/j.datak.2011.09.001","DOI":"10.1016\/j.datak.2011.09.001"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Essaouini, N., Cuppens, F., Cuppens-Boulahia, N., El Kalam, A.A.: Conflict management in obligation with deadline policies. In: Proceedings of the 2013 International Conference on Availability, Reliability and Security, ARES 2013, pp. 52\u201361. IEEE Computer Society, Washington, DC (2013). http:\/\/dx.doi.org\/10.1109\/ARES.2013.12","DOI":"10.1109\/ARES.2013.12"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Green, C.: Application of theorem proving to problem solving. In: Proceedings of the 1st International Joint Conference on Artificial Intelligence, IJCAI 1969, pp. 219\u2013239. Morgan Kaufmann Publishers Inc., San Francisco (1969). http:\/\/dl.acm.org\/citation.cfm?id=1624562.1624585","DOI":"10.21236\/ADA459656"},{"key":"5_CR6","unstructured":"Levesque, H.J., Reiter, R., Lesp\u00e9rance, Y., Lin, F., Scherl, R.B.: GOLOG: a logic programming language for dynamic domains. J. Log. Program. 31(1\u20133), 59\u201383 (1997). http:\/\/dx.doi.org\/10.1016\/S0743-1066(96)00121--5"},{"key":"5_CR7","unstructured":"McCarthy, J.: Situations, actions, and causal laws. Stanford Artificial Intelligence Project, Stanford University, Technical report Memo 2 (1983)"},{"key":"5_CR8","unstructured":"Reiter, R.: Sequential, temporal GOLOG. In: Cohn, A.G., Schubert, L.K., Shapiro, S.C. (eds.) Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR 1998), Trento, Italy, 2\u20135 June 1998, pp. 547\u2013556. Morgan Kaufmann (1998)"},{"key":"5_CR9","unstructured":"Reiter, R.: Natural actions, concurrency and continuous time in the situation calculus. In: Aiello, L.C., Doyle, J., Shapiro, S.C. (eds.) Proceedings of the Fifth International Conference on Principles of Knowledge Representation and Reasoning (KR 1996), Cambridge, Massachusetts, USA, 5\u20138 November 1996, pp. 2\u201313. Morgan Kaufmann (1996)"},{"issue":"5","key":"5_CR10","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1093\/logcom\/4.5.655","volume":"4","author":"F Lin","year":"1994","unstructured":"Lin, F., Reiter, R.: State constraints revisited. J. Log. Comput. 4(5), 655\u2013678 (1994)","journal-title":"J. Log. Comput."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Reiter, R.: The frame problem in situation the calculus: a simple solution (sometimes) and a completeness result for goal regression. In: Lifschitz, V. (ed.) Artificial Intelligence and Mathematical Theory of Computation, pp. 359\u2013380. Academic Press Professional Inc., San Diego (1991). http:\/\/dl.acm.org\/citation.cfm?id=132218.132239","DOI":"10.1016\/B978-0-12-450010-5.50026-8"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Reiter, R.: Proving properties of states in the situation calculus. Artif. Intell. 64(2), 337\u2013351 (1993). http:\/\/dx.doi.org\/10.1016\/0004-3702(93)90109-O","DOI":"10.1016\/0004-3702(93)90109-O"},{"key":"5_CR13","unstructured":"Green, C.: Theorem-proving by resolution as a basis for question-answering systems. In: Meltzer, B., Michie, D. (eds.) Machine Intelligence, vol. 4, ch. 11, pp. 183\u2013205. Edinburgh University Press (1969)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Craven, R., Lobo, J., Ma, J., Russo, A., Lupu, E., Bandara, A.: Expressive policy analysis with enhanced system dynamicity. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009, pp. 239\u2013250. ACM, New York (2009). http:\/\/doi.acm.org\/10.1145\/1533057.1533091","DOI":"10.1145\/1533057.1533091"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Kowalski, R., Sergot, M.: A logic-based calculus of events. New Gen. Comput. 4(1), 67\u201395. http:\/\/dx.doi.org\/10.1007\/BF03037383","DOI":"10.1007\/BF03037383"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/3-540-45632-5_17","volume-title":"Computational Logic: Logic Programming and Beyond","author":"R Miller","year":"2002","unstructured":"Miller, R., Shanahan, M.: Some alternative formulations of the event calculus. In: Kakas, A.C., Sadri, F. (eds.) Computational Logic: Logic Programming and Beyond. LNCS (LNAI), vol. 2408, pp. 452\u2013490. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45632-5_17"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: Formal enforcement and management of obligation policies. Data Knowl. Eng. 71(1), 127\u2013147 (2012). http:\/\/dx.doi.org\/10.1016\/j.datak.2011.09.001","DOI":"10.1016\/j.datak.2011.09.001"},{"key":"5_CR18","unstructured":"Sartor, G.: Legal reasoning: A cognitive approach to the law. Springer (2005)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Sartor, G.: Doing justice to rights, values: teleological reasoning and proportionality. Artif. Intell. Law 18(2), 175\u2013215 (2010). http:\/\/dx.doi.org\/10.1007\/s10506-010-9095-7","DOI":"10.1007\/s10506-010-9095-7"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T18:11:12Z","timestamp":1568571072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}