{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:23:09Z","timestamp":1742386989281},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_19","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T20:34:45Z","timestamp":1284842085000},"page":"219-230","source":"Crossref","is-referenced-by-count":29,"title":["Model-Checking Access Control Policies"],"prefix":"10.1007","author":[{"given":"Dimitar P.","family":"Guelev","sequence":"first","affiliation":[]},{"given":"Mark","family":"Ryan","sequence":"additional","affiliation":[]},{"given":"Pierre Yves","family":"Schobbens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"19_CR1","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/3-540-45518-3_16","volume-title":"Middleware 2001","author":"J.M. Bacon","year":"2001","unstructured":"Bacon, J.M., Moody, K., Yao, W.: Access control and trust in the use of widely distributed services. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, p. 295. Springer, Heidelberg (2001) ,Also: Software Practice and Experience 33, (2003)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bandmann, O., Dam, M., Firozabadi, B.: Constrained delegations. In: Proc. IEEE Symposium on Security and Privacy, pp. 131\u2013142 (2002)","DOI":"10.1109\/SECPRI.2002.1004367"},{"key":"19_CR4","unstructured":"Barka, E.S.: Framework for Role-Based Delagation Models. PhD thesis, George Mason University (2002)"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1002\/spe.513","volume":"33","author":"S. Capitani di Vimercati De","year":"2003","unstructured":"De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Access control: principles and solutions. Software Practice and Experience\u00a033, 397\u2013421 (2003)","journal-title":"Software Practice and Experience"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Guelev, D.P.: Prolog code supporting Model-checking access control policies (November 2003), http:\/\/www.cs.bham.ac.uk\/~dpg\/mcacp\/","DOI":"10.1007\/978-3-540-30144-8_19"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Guelev, D.P., Ryan, M.D., Schobbens, P.Y.: Model-checking access control policies (April 2004), http:\/\/www.cs.bham.ac.uk\/~dpg\/fullaclpaper.ps\/","DOI":"10.1007\/978-3-540-30144-8_19"},{"key":"19_CR8","volume-title":"Monotonic protection systems","author":"M. Harrison","year":"1978","unstructured":"Harrison, M., Ruzzo, W.: Monotonic protection systems. Academic Press, New York (1978)"},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/800213.806517","volume-title":"Proceedings of the fifth symposium on Operating systems principles","author":"M.A. Harrison","year":"1975","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: On protection in operating systems. In: Proceedings of the fifth symposium on Operating systems principles, pp. 14\u201324. ACM Press, New York (1975)"},{"issue":"4","key":"19_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"19_CR11","volume-title":"On synchronization and security","author":"R. Lipton","year":"1978","unstructured":"Lipton, R., Snyder, L.: On synchronization and security. Academic Press, New York (1978)"},{"key":"19_CR12","volume-title":"Semantics with Applications: A Formal Introduction","author":"H. Riis Nielson","year":"1992","unstructured":"Riis Nielson, H., Nielson, F.: Semantics with Applications: A Formal Introduction. Wiley, Chichester (1992)"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/RISP.1992.213266","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"R. Sandhu","year":"1992","unstructured":"Sandhu, R.: The typed access matrix model. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 122\u2013136. IEEE Computer Society Press, Los Alamitos (1992)"},{"issue":"2","key":"19_CR14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:52:27Z","timestamp":1619999547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}