{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:57:29Z","timestamp":1725566249023},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540230137"},{"type":"electronic","value":"9783540302308"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30230-8_47","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T21:25:04Z","timestamp":1284845104000},"page":"513-525","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Policy Language for Humans and Computers"],"prefix":"10.1007","author":[{"given":"Vicky","family":"Weissman","sequence":"first","affiliation":[]},{"given":"Carl","family":"Lagoze","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Altova. Xmlspy (2004), \n                    \n                      http:\/\/www.xmlspy.com\/productside.html"},{"key":"47_CR2","unstructured":"Association for Computing Machinery. The ACM guide: Terms of usage (2004), \n                    \n                      http:\/\/portal.acm.org\/info\/usage.cfm"},{"issue":"3","key":"47_CR3","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems\u00a023(3), 231\u2013285 (1998)","journal-title":"ACM Transactions on Database Systems"},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 95\u2013103 (2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"key":"47_CR5","volume-title":"A Mathematical Introduction to Logic","author":"H.B. Enderton","year":"1972","unstructured":"Enderton, H.B.: A Mathematical Introduction to Logic. Academic Press, New York (1972)"},{"key":"47_CR6","volume-title":"Database Systems: The Complete Book.","author":"H. Garcia-Molina","year":"2002","unstructured":"Garcia-Molina, H., Ullman, J.D., Widom, J.: Database Systems: The Complete Book. Prentice Hall, New Jersey (2002)"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Halpern, J., Weissman, V.: Using first-order logic to reason about policies. In: Proc. 16th IEEE Computer Security Foundations Workshop, pp. 187\u2013201 (2003)","DOI":"10.1109\/CSFW.2003.1212713"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Halpern, J., Weissman, V.: A formal foundation for XrML. In: Proc. 17th IEEE Computer Security Foundations Workshop (2004)","DOI":"10.1109\/CSFW.2004.1310745"},{"key":"47_CR9","unstructured":"Iannella, R.: ODRL: The open digital rights language initiative (2001), \n                    \n                      http:\/\/odrl.net\/"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Jim, T.: SD3: A trust management system with certified evaluation. In: Proceedings 2001 IEEE Symposium on Security and Privacy, pp. 106\u2013115 (2001)","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation Logic: A logic-based approach to distributed authorization. ACM Transaction on Information and System Security, TISSEC (2003) (to appear)","DOI":"10.1145\/605434.605438"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (January 2003) (to appear)","DOI":"10.1007\/3-540-36388-2_6"},{"key":"47_CR13","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 114\u2013130 (2002)"},{"key":"47_CR14","unstructured":"MPEG. Information technology\u2014Multimedia framework (MPEG-21) \u2013 Part 5: Rights expression language (ISO\/IEC 21000-5:2004) (2004), \n                    \n                      http:\/\/www.iso.ch\/iso\/en\/"},{"key":"47_CR15","unstructured":"Pucella, R., Weissman, V.: A formal foundation for ODRL rights. In: Workshop on Issues in the Theory of Security, WITS (2004)"},{"key":"47_CR16","unstructured":"Ltd SyncRo Soft. Oxygen (2004), \n                    \n                      http:\/\/www.oxygenxml.com\/javawebstart"}],"container-title":["Lecture Notes in Computer Science","Research and Advanced Technology for Digital Libraries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30230-8_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:58:23Z","timestamp":1619999903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30230-8_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540230137","9783540302308"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30230-8_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}