{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:23:43Z","timestamp":1748219023574,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540250791"},{"type":"electronic","value":"9783540318453"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31845-3_2","type":"book-chapter","created":{"date-parts":[[2010,7,5]],"date-time":"2010-07-05T19:43:57Z","timestamp":1278359037000},"page":"2-20","source":"Crossref","is-referenced-by-count":13,"title":["The Structure of Authority: Why Security Is Not a Separable Concern"],"prefix":"10.1007","author":[{"given":"Mark S.","family":"Miller","sequence":"first","affiliation":[]},{"given":"Bill","family":"Tulloh","sequence":"additional","affiliation":[]},{"given":"Jonathan S.","family":"Shapiro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"126","volume-title":"Information Security: An Integrated Collection of Essays","author":"M. Abrams","year":"1995","unstructured":"Abrams, M., Bailey, D.: Abstraction and Refinement of Layered Security Policy. In: Abrams, M.D., Jajodia, S., Podell, H.J. (eds.) Information Security: An Integrated Collection of Essays, pp. 126\u2013136. IEEE Computer Society Press, Los Alamitos (1995)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bishop, M., Snyder, L.: The Transfer of Information and Authority in a Protection System. In: Proc. 7th ACM Symposium on Operating Systems Principles, Operating Systems Review, vol.\u00a013(4), pp. 45\u201354 (1979)","DOI":"10.1145\/800215.806569"},{"key":"2_CR3","unstructured":"Tyler Close \u201cWhat Does the \u2019y\u2019 Refer to\u201d (2003), http:\/\/www.waterken.com\/dev\/YURL\/Definition\/"},{"issue":"3","key":"2_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/365230.365252","volume":"9","author":"J.B. Dennis","year":"1966","unstructured":"Dennis, J.B., Van Horn, E.C.: Programming Semantics for Multiprogrammed Computations. Communications of the ACM\u00a09(3), 143\u2013155 (1966)","journal-title":"Communications of the ACM"},{"key":"2_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-5695-3","volume-title":"Selected Writings on Computing: A Personal Perspective","author":"E.W. Dijkstra","year":"1982","unstructured":"Dijkstra, E.W.: On the role of scientific thought\u201d, EWD 447. In: Dijkstra, E.W. (ed.) Selected Writings on Computing: A Personal Perspective. Springer, Heidelberg (1982)"},{"key":"2_CR6","first-page":"417","volume-title":"Proc. AFIPS 1972 SJCC","author":"G.S. Graham","year":"1972","unstructured":"Graham, G.S., Denning, P.J.: Protection-principles and practice. In: Proc. AFIPS 1972 SJCC, vol.\u00a040, pp. 417\u2013429. AFIPS Press, Montvale (1972)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Hardy, N.: The KeyKOS Architecture. ACM Operating Systems Review, 8\u201325 (September 1985), http:\/\/www.agorics.com\/Library\/KeyKos\/architecture.html","DOI":"10.1145\/858336.858337"},{"key":"2_CR8","first-page":"519","volume":"4","author":"F.A. Hayek","year":"1945","unstructured":"Hayek, F.A.: Use of Knowledge in Society. American Economic Review\u00a0XXXV(4), 519\u2013530 (1945), http:\/\/www.virtualschool.edu\/mon\/Economics\/HayekUseOfKnowledge.html","journal-title":"American Economic Review"},{"key":"2_CR9","unstructured":"Hayek, F.A.: The Theory of Complex Phenomena. In: Bunge (ed.) The Critical Approach to Science and Philosophy (1964)"},{"key":"2_CR10","unstructured":"Hewitt, C., Baker, H.: Actors and Continuous Functionals. MIT-LCS-TR-194 (1977) Locality Laws online at, http:\/\/www.erights.org\/history\/actors.html"},{"key":"2_CR11","unstructured":"Howard, M., Pincus, J., Wing, J.M.: Measuring Relative Attack Surfaces. In: Proceedings of the Workshop on Advanced Developments in Software and Systems Security (2003)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Lampson, B.W.: Protection. ACM Operating Systems Review.\u00a08(1) (January 1974)","DOI":"10.1145\/775265.775268"},{"key":"2_CR13","volume-title":"Concurrent Prolog: Collected Papers","author":"M.S. Miller","year":"1987","unstructured":"Miller, M.S., Bobrow, D.G., Tribble, E.D., Levy, J.: Logical Secrets. In: Shapiro, E. (ed.) Concurrent Prolog: Collected Papers, MIT Press, Cambridge (1987)"},{"key":"2_CR14","unstructured":"Miller, M.S.: A Theory of Taming (2002), http:\/\/www.erights.org\/elib\/legacy\/taming.html"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-540-40965-6_15","volume-title":"Advances in Computing Science \u2013 ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation","author":"M.S. Miller","year":"2003","unstructured":"Miller, M.S., Shapiro, J.S.: Paradigm Regained: Abstraction mechanisms for access control. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol.\u00a02896, pp. 224\u2013242. Springer, Heidelberg (2003)"},{"key":"2_CR16","volume-title":"The Source of Authority for Commercial Access Control","author":"J.D. Moffett","year":"1988","unstructured":"Moffett, J.D., Sloman, M.S.: The Source of Authority for Commercial Access Control. IEEE Computer, Los Alamitos (1988)"},{"issue":"1","key":"2_CR17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/361932.361937","volume":"16","author":"J.H. Morris","year":"1973","unstructured":"Morris, J.H.: Protection in Programming Languages. CACM\u00a016(1), 15\u201321 (1973), http:\/\/www.erights.org\/history\/morris73.pdf","journal-title":"CACM"},{"issue":"12","key":"2_CR18","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"D.L. Parnas","year":"1972","unstructured":"Parnas, D.L.: On the Criteria To Be Used in Decomposing a System into Modules. Communications of the ACM\u00a015(12), 1053\u20131058 (1972)","journal-title":"Communications of the ACM"},{"key":"2_CR19","series-title":"MIT AI Memo No. 1564","volume-title":"A Security Kernel Based on the Lambda-Calculus","author":"J. Rees","year":"1996","unstructured":"Rees, J.: A Security Kernel Based on the Lambda-Calculus. MIT AI Memo No. 1564. MIT, Cambridge (1996), http:\/\/mumble.net\/jar\/pubs\/secureos\/"},{"issue":"9","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J.H. Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The Protection of Information in Computer Systems. Proceedings of the IEEE\u00a063(9), 1278\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Schneider, F.B.: Least Privilege and More. IEEE Security & Privacy, 55\u201359 (September\/October 2003)","DOI":"10.1109\/MSECP.2003.1236236"},{"key":"2_CR22","first-page":"467","volume":"106","author":"H.S. Simon","year":"1962","unstructured":"Simon, H.S.: The Architecture of Complexity: Hierarchic Systems. Proceedings of the American Philosophical Society\u00a0106, 467\u2013482 (1962)","journal-title":"Proceedings of the American Philosophical Society"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: A Fast Capability System. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles, December 1999, pp. 170\u2013185 (1999)","DOI":"10.1145\/319151.319163"},{"key":"2_CR24","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-31845-3_3","volume-title":"Multiparadigm Programming in Mozart\/Oz","author":"F. Spiessens","year":"2005","unstructured":"Spiessens, F., Roy, P.V.: The Oz-E Project: Design Guidelines for a Secure Multiparadigm Programming Language. In: Van Roy, P. (ed.) MOZ 2004. LNCS (LNAI), vol.\u00a03389, pp. 21\u201340. Springer, Heidelberg (2005)"},{"key":"2_CR25","unstructured":"Stiegler, M., Miller, M.: A Capability Based Client: The DarpaBrowser (2002), http:\/\/www.combex.com\/papers\/darpa-report\/index.html"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Stiegler, M., Karp, A.H., Yee, K.-P., Miller, M.: Polaris: Virus Safe Computing for Windows XP, HP Tech Report (in preparation)","DOI":"10.1145\/1151030.1151033"},{"key":"2_CR27","volume-title":"To appear in Economics, Philosophy, & Information Technology: The Intellectual Contributions of Don Lavoie","author":"B. Tulloh","year":"2002","unstructured":"Tulloh, B., Miller, M.S.: Institutions as Abstraction Boundaries. In: To appear in Economics, Philosophy, & Information Technology: The Intellectual Contributions of Don Lavoie, George Mason University, Fairfax, VA (2002), http:\/\/www.erights.org\/talks\/categories\/"},{"key":"2_CR28","unstructured":"Wagner, D., Tribble, D.: A Security Analysis of the Combex DarpaBrowser Architecture (2002), http:\/\/www.combex.com\/papers\/darpa-review\/index.html"},{"key":"2_CR29","volume-title":"Object Design: Roles, Responsibilities, and Collaborations","author":"R. Wirfs-Brock","year":"2002","unstructured":"Wirfs-Brock, R., McKean, A.: Object Design: Roles, Responsibilities, and Collaborations. Addison-Wesley, Reading (2002)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Yee, K.-P.: User Interaction Design for Secure Systems. In: Proceedings of the International Conference on Information and Communications Security (2002) Complete version online at, http:\/\/zesty.ca\/pubs\/csd-02-1184.ps","DOI":"10.1007\/3-540-36159-6_24"},{"key":"2_CR31","unstructured":"Yee, K.-P.: Aligning Usability and Security. IEEE Security & Privacy Magazine (September 2004)"}],"container-title":["Lecture Notes in Computer Science","Multiparadigm Programming in Mozart\/Oz"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31845-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T16:40:55Z","timestamp":1740242455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31845-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540250791","9783540318453"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31845-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}