{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:29:07Z","timestamp":1742938147052,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319590400"},{"type":"electronic","value":"9783319590417"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59041-7_6","type":"book-chapter","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T02:43:06Z","timestamp":1493865786000},"page":"96-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Compliance Verification Algorithm for Computer Systems Security Policies"],"prefix":"10.1007","author":[{"given":"Liviu","family":"Pene","sequence":"first","affiliation":[]},{"given":"Lamia","family":"Hamza","sequence":"additional","affiliation":[]},{"given":"Kamel","family":"Adi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,5]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/BFb0053547","volume-title":"Foundations of Software Science and Computation Structures","author":"L Cardelli","year":"1998","unstructured":"Cardelli, L., Gordon, A.D.: Mobile ambients. In: Nivat, M. (ed.) FoSSaCS 1998. LNCS, vol. 1378, pp. 140\u2013155. Springer, Heidelberg (1998). doi:10.1007\/BFb0053547"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Cardelli, L., Gordon, A.D.: Anytime, anywhere: modal logics for mobile ambients. In: POPL 2000: Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, vol. 365, p. 377 (2000)","DOI":"10.1145\/325694.325742"},{"key":"6_CR3","unstructured":"Cardelli, L., Gordon, A.D.: Ambient logic. Mathematical Structures in Computer Science (2006)"},{"issue":"2","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2168\/LMCS-2(2:3)2006","volume":"2","author":"D Hirschkoff","year":"2006","unstructured":"Hirschkoff, D., Lozes, E., Sangiorgi, D.: On the expressiveness of the ambient logic. Logical Methods Comput. Sci. 2(2), 1\u201335 (2006)","journal-title":"Logical Methods Comput. Sci."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Basin, D., Klaedtke, F., M\u00fcller, S.: Monitoring security policies with metric first-order temporal logic. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, pp. 23\u201334. ACM, New York (2010)","DOI":"10.1145\/1809842.1809849"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-44464-5_15","volume-title":"Advances in Computing Science \u2014 ASIAN 2000","author":"P Degano","year":"2000","unstructured":"Degano, P., Levi, F., Bodei, C.: Safe ambients: control flow analysis and security. In: Jifeng, H., Sato, M. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199\u2013214. Springer, Heidelberg (2000). doi:10.1007\/3-540-44464-5_15"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/596980.596981","volume":"25","author":"F Levi","year":"2003","unstructured":"Levi, F., Sangiorgi, D.: Mobile safe ambients. ACM Trans. Program. Lang. Syst. 25(1), 1\u201369 (2003)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"6_CR8","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-0-387-35496-5_14","volume-title":"Formal Methods for Open Object-Based Distributed Systems V","author":"C Braghin","year":"2002","unstructured":"Braghin, C., Cortesi, A., Focardi, R.: Control flow analysis of mobile ambients with security boundaries. In: Jacobs, B., Rensink, A. (eds.) FMOODS 2002. ITIFIP, vol. 81, pp. 197\u2013212. Springer, Boston, MA (2002). doi:10.1007\/978-0-387-35496-5_14"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Ferrari, G., Moggi, E., Pugliese, R.: Guardians for ambient-based monitoring. In: F-WAN: Foundations of Wide Area Network Computing, vol. 66 (2002)","DOI":"10.1016\/S1571-0661(04)80416-X"},{"key":"6_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-0357-2","volume-title":"First-Order Logic and Automated Theorem Proving","author":"M Fitting","year":"1990","unstructured":"Fitting, M.: First-Order Logic and Automated Theorem Proving. Springer, New York (1990)"},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.apal.2011.09.004","volume":"163","author":"M Fitting","year":"2012","unstructured":"Fitting, M.: Prefixed tableaus and nested sequents. Ann. Pure Appl. Logic 163(3), 291\u2013313 (2012)","journal-title":"Ann. Pure Appl. Logic"},{"issue":"8","key":"6_CR12","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/BF00264284","volume":"27","author":"R Cleaveland","year":"1990","unstructured":"Cleaveland, R.: Tableau-based model checking in the propositional mu-calculus. Acta Informatica 27(8), 725\u2013747 (1990)","journal-title":"Acta Informatica"},{"key":"6_CR13","unstructured":"Paulson, L.C.: The isabelle reference manual (2008)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-540-45206-5_18","volume-title":"Automated Reasoning with Analytic Tableaux and Related Methods","author":"P Abate","year":"2003","unstructured":"Abate, P., Gor\u00e9, R.: The tableaux work bench. In: Cialdea Mayer, M., Pirri, F. (eds.) TABLEAUX 2003. LNCS, vol. 2796, pp. 230\u2013236. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-45206-5_18"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-45744-5_38","volume-title":"Automated Reasoning","author":"LF Cerro","year":"2001","unstructured":"Cerro, L.F., Fauthoux, D., Gasquet, O., Herzig, A., Longin, D., Massacci, F.: Lotrec: the generic tableau prover for modal and description logics. In: Gor\u00e9, R., Leitsch, A., Nipkow, T. (eds.) IJCAR 2001. LNCS, vol. 2083, pp. 453\u2013458. Springer, Heidelberg (2001). doi:10.1007\/3-540-45744-5_38"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/11554554_25","volume-title":"Automated Reasoning with Analytic Tableaux and Related Methods","author":"O Gasquet","year":"2005","unstructured":"Gasquet, O., Herzig, A., Longin, D., Sahade, M.: LoTREC: logical tableaux research engineering companion. In: Beckert, B. (ed.) TABLEAUX 2005. LNCS, vol. 3702, pp. 318\u2013322. Springer, Heidelberg (2005). doi:10.1007\/11554554_25"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. (TISSEC) 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"KW Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. (TOPLAS) 28(1), 175\u2013205 (2006)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"6_CR19","unstructured":"Bauer, L., Ligatti, J., Walker, D.: A language and system for enforcing run-time security policies. Technical report TR-699-04, Princeton University (2004)"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/2487222.2487225","volume":"16","author":"D Basin","year":"2013","unstructured":"Basin, D., Jug\u00e9, V., Klaedtke, F., Z\u0103linescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1), 3:1\u20133:26 (2013)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"6_CR21","unstructured":"Hamlen, K.: Security policy enforcement by automated program-rewriting. Ph.D. thesis, Cornell University, Ithaca, NY, USA (2006). AAI3227141"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1016\/j.jsc.2011.05.003","volume":"3","author":"M Langar","year":"2011","unstructured":"Langar, M., Mejri, M., Adi, K.: Formal enforcement of security policies on concurrent systems. J. Symbolic Comput. 3, 997\u20131016 (2011)","journal-title":"J. Symbolic Comput."},{"issue":"2\/3\/4","key":"6_CR23","first-page":"113","volume":"7","author":"R Khoury","year":"2015","unstructured":"Khoury, R., Tawbi, N.: Equivalence-preserving corrective enforcement of security properties. Int. J. Inf. Comput. Secur. 7(2\/3\/4), 113\u2013139 (2015)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-30303-1_22","volume-title":"Foundations and Practice of Security","author":"G Sui","year":"2016","unstructured":"Sui, G., Mejri, M.: Security enforcement by rewriting: an algebraic approach. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds.) FPS 2015. LNCS, vol. 9482, pp. 311\u2013321. Springer, Cham (2016). doi:10.1007\/978-3-319-30303-1_22"},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/S0304-3975(02)00364-X","volume":"291","author":"K Adi","year":"2003","unstructured":"Adi, K., Debbabi, M., Mejri, M.: A new logic for electronic commerce protocols. Int. J. Theor. Comput. Sci. (TCS) 291, 223\u2013283 (2003)","journal-title":"Int. J. Theor. Comput. Sci. (TCS)"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Embracing the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59041-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:37:07Z","timestamp":1710355027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59041-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319590400","9783319590417"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59041-7_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"5 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCETECH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on E-Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcetech2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mcetech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}