{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:23:55Z","timestamp":1756992235749},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_40","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T16:19:11Z","timestamp":1512663551000},"page":"648-659","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper)"],"prefix":"10.1007","author":[{"given":"Orhio Mark","family":"Creado","sequence":"first","affiliation":[]},{"given":"Phu Dung","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"40_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-24255-2_16","volume-title":"Computer Safety, Reliability, and Security","author":"H Alemzadeh","year":"2015","unstructured":"Alemzadeh, H., Chen, D., Lewis, A., Kalbarczyk, Z., Raman, J., Leveson, N., Iyer, R.: Systems-theoretic safety assessment of robotic telesurgical systems. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 213\u2013227. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24255-2_16"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Laughton, M.A.: Artificial intelligence techniques in power systems. In: IEE Colloquium on Artificial Intelligence Techniques in Power Systems (Digest No: 1997\/354), 1\/1-119, November 1997","DOI":"10.1049\/ic:19971179"},{"key":"40_CR3","unstructured":"Frank, J.: Artificial intelligence and intrusion detection: current and future directions. In. Proceedings of the 17th National Computer Security Conference (1994)"},{"key":"40_CR4","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.robot.2017.04.004","volume":"94","author":"J Guiochet","year":"2017","unstructured":"Guiochet, J., Machin, M., Waeselynck, H.: Safety-critical advanced robots: a survey. Rob. Auton. Syst. 94, 43\u201352 (2017)","journal-title":"Rob. Auton. Syst."},{"key":"40_CR5","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.ssci.2015.12.017","volume":"84","author":"J Guiochet","year":"2016","unstructured":"Guiochet, J.: Hazard analysis of human-robot interactions with HAZOP-UML. Saf. Sci. 84, 225\u2013237 (2016)","journal-title":"Saf. Sci."},{"issue":"02","key":"40_CR6","doi-asserted-by":"crossref","first-page":"211","DOI":"10.4236\/jsea.2017.102013","volume":"10","author":"MA Lamddi","year":"2017","unstructured":"Lamddi, M.A.: Developing dependability requirements engineering for secure and safe information systems with knowledge acquisition for automated specification. J. Softw. Eng. Appl. 10(02), 211 (2017)","journal-title":"J. Softw. Eng. Appl."},{"issue":"4","key":"40_CR7","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1145\/362258.362278","volume":"13","author":"PB Hansen","year":"1970","unstructured":"Hansen, P.B.: The nucleus of a multiprogramming system. Commun. ACM 13(4), 238\u2013241 (1970)","journal-title":"Commun. ACM"},{"issue":"10","key":"40_CR8","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1145\/355620.361161","volume":"17","author":"CAR Hoare","year":"1974","unstructured":"Hoare, C.A.R.: Monitors: an operating system structuring concept. Commun. ACM 17(10), 549\u2013557 (1974)","journal-title":"Commun. ACM"},{"issue":"5","key":"40_CR9","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/360051.360079","volume":"19","author":"JH Howard","year":"1976","unstructured":"Howard, J.H.: Proving monitors. Commun. ACM 19(5), 273\u2013279 (1976)","journal-title":"Commun. ACM"},{"issue":"5","key":"40_CR10","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1002\/spe.4380070506","volume":"7","author":"AM Lister","year":"1977","unstructured":"Lister, A.M., Sayer, P.J.: Hierarchical monitors. Softw. Pract. Experience 7(5), 613\u2013623 (1977)","journal-title":"Softw. Pract. Experience"},{"issue":"3","key":"40_CR11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/850644.850645","volume":"11","author":"A Lister","year":"1977","unstructured":"Lister, A.: The problem of nested monitor calls. ACM SIGOPS Oper. Syst. Rev. 11(3), 5\u20137 (1977)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"40_CR12","unstructured":"Department of Defense, U.S.D.: Trusted computer system evaluation criteria (1985). Accessed 15 July 2015"},{"issue":"6","key":"40_CR13","first-page":"40","volume":"10","author":"S Murdoch","year":"2012","unstructured":"Murdoch, S., Bond, M., Anderson, R.J.: How certification systems fail: lessons from the ware report. IEEE Secur. Priv. 10(6), 40\u201344 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"40_CR14","unstructured":"Nibaldi, G.H.: Specification of a trusted computing base (TCB). Technical report ADA108831, MITRE Corporation, Bedford, Massachusetts, USA, November 1979. Accessed 15 July 2015"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., St\u00fcble, C., Waidner, M., Weber, A.: The PERSEUS system architecture (2001). Accessed 15 July 2015","DOI":"10.1007\/978-3-663-05918-9_1"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"DiRossi, M.: Towards a high assurance secure computing platform. In: Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium, HASE 2007, pp. 381\u2013382 (2007)","DOI":"10.1109\/HASE.2007.25"},{"issue":"5","key":"40_CR17","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MC.2006.156","volume":"39","author":"A Tanenbaum","year":"2006","unstructured":"Tanenbaum, A., Herder, J., Bos, H.: Can we make operating systems reliable and secure? Computer 39(5), 44\u201351 (2006)","journal-title":"Computer"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Liedtke, J.: On $$\\mu $$ \u03bc -kernel construction. In: Proceedings of the 15th ACM Symposium on Operating System Principles, SOSP 1995, pp. 237\u2013250. ACM, December 1995","DOI":"10.1145\/224057.224075"},{"issue":"6","key":"40_CR19","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1743546.1743574","volume":"53","author":"G Klein","year":"2010","unstructured":"Klein, G., Andronick, J., Elphinstone, K., Heiser, G., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: formal verification of an operating-system kernel. Commun. ACM 53(6), 107\u2013115 (2010)","journal-title":"Commun. ACM"},{"issue":"11","key":"40_CR20","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/32.106971","volume":"17","author":"P Karger","year":"1991","unstructured":"Karger, P., Zurko, M., Bonin, D., Mason, A., Kahn, C.: A retrospective on the VAX VMM security kernel. IEEE Trans. Softw. Eng. 17(11), 1147\u20131165 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Nie, X.W., Feng, D.G., Che, J.J., Wang, X.P.: Design and implementation of security operating system based on trusted computing. In: 2006 International Conference on Machine Learning and Cybernetics, pp. 2776\u20132781 (2006)","DOI":"10.1109\/ICMLC.2006.258997"},{"key":"40_CR22","doi-asserted-by":"crossref","unstructured":"Setapa, S., Isa, M., Abdullah, N., Manan, J.L.: Trusted computing based microkernel. In: Proceedings of the 2010 International Conference on Computer Applications and Industrial Electronics, ICCAIE 2010, pp. 1\u20134 (2010)","DOI":"10.1109\/ICCAIE.2010.5771164"},{"key":"40_CR23","doi-asserted-by":"crossref","unstructured":"Hendricks, J., van Doorn, L.: Secure bootstrap is not enough: shoring up the trusted computing base. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, EW, p. 11. ACM (2004)","DOI":"10.1145\/1133572.1133600"},{"key":"40_CR24","doi-asserted-by":"crossref","unstructured":"Gong, L.: A secure identity-based capability system. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 56\u201363 (1989)","DOI":"10.1109\/SECPRI.1989.36277"},{"key":"40_CR25","unstructured":"Neumann, P.G., Watson, R.N.M.: Capabilities revisited: a holistic approach to bottom-to-top assurance of trustworthy systems. In: Proceedings of the 4th Annual Layered Assurance Workshop, LAW 2010 (2010). Accessed 15 July 2015"},{"issue":"3","key":"40_CR26","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/2093548.2093572","volume":"55","author":"RNM Watson","year":"2012","unstructured":"Watson, R.N.M., Anderson, J., Laurie, B., Kennaway, K.: A taste of capsicum: practical capabilities for UNIX. Commun. ACM 55(3), 97\u2013104 (2012)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T17:17:34Z","timestamp":1570468654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}