{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T01:10:11Z","timestamp":1740791411947,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540254355"},{"type":"electronic","value":"9783540319870"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31987-0_11","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T18:42:00Z","timestamp":1292870520000},"page":"141-156","source":"Crossref","is-referenced-by-count":28,"title":["A Type Discipline for Authorization Policies"],"prefix":"10.1007","author":[{"given":"C\u00e9dric","family":"Fournet","sequence":"first","affiliation":[]},{"given":"Andrew D.","family":"Gordon","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Maffeis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1\u20132","key":"11_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-1998-61-202","volume":"6","author":"M. Abadi","year":"1998","unstructured":"Abadi, M.: On SDSI\u2019s linked local name spaces. J. Computer Security\u00a06(1\u20132), 3\u201321 (1998)","journal-title":"J. Computer Security"},{"issue":"5","key":"11_CR2","first-page":"749","volume":"46","author":"M. Abadi","year":"1999","unstructured":"Abadi, M.: Secrecy by typing in security protocols. J.\u00a0ACM\u00a046(5), 749\u2013786 (1999)","journal-title":"J.\u00a0ACM"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation\u00a0148, 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: flexible trust management, applied to electronic health records. In: 17th IEEE Computer Security Foundations Workshop (CSFW 2004), June 2004, pp. 139\u2013154 (2004)","DOI":"10.1109\/CSFW.2004.1310738"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-45789-5_25","volume-title":"Static Analysis","author":"B. Blanchet","year":"2002","unstructured":"Blanchet, B.: From secrecy to authenticity in security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 342\u2013359. Springer, Heidelberg (2002)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE 17th Symposium on Research in Security and Privacy, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Braghin, C., Gorla, D., Sassone, V.: A distributed calculus for role-based access control. In: 17th IEEE Computer Security Foundations Workshop (CSFW 2004), June 2004, pp. 48\u201360 (2004)","DOI":"10.1109\/CSFW.2004.1310731"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/963778.963781","volume":"26","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Access control for mobile agents: the calculus of boxed ambients. ACM TOPLAS\u00a026(1), 57\u2013124 (2004)","journal-title":"ACM TOPLAS"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-28644-8_15","volume-title":"CONCUR 2004 - Concurrency Theory","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Colazzo, D., Crafa, S.: Type based discretionary access control. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol.\u00a03170, pp. 225\u2013239. Springer, Heidelberg (2004)"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/69.43410","volume":"1","author":"S. Ceri","year":"1989","unstructured":"Ceri, S., Gottlob, G., Tanca, L.: What you always wanted to know about Datalog (and never dared to ask). IEEE Transactions on Knowledge and Data Engineering\u00a01(1), 146\u2013166 (1989)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"11_CR11","unstructured":"ContentGuard. XrML 2.0 Technical Overview (March 2002), http:\/\/www.xrml.org\/"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"De Treville, J.: Binder, a logic-based security language. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 105\u2013113 (2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT\u201329","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a0IT\u201329(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. Technical Report MSR\u2013TR\u20132005\u201301, Microsoft Research (2005)","DOI":"10.1007\/978-3-540-31987-0_11"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/3-540-36532-X_17","volume-title":"Software Security \u2013 Theories and Systems","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Typing one-to-one and one-to-many correspondences in security protocols. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 270\u2013282. Springer, Heidelberg (2003)"},{"issue":"4","key":"11_CR16","doi-asserted-by":"crossref","first-page":"451","DOI":"10.3233\/JCS-2003-11402","volume":"11","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. J. Computer Security\u00a011(4), 451\u2013521 (2003)","journal-title":"J. Computer Security"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/S0304-3975(02)00333-X","volume":"300","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Typing correspondence assertions for communication protocols. Theoretical Comput. Sci.\u00a0300, 379\u2013409 (2003)","journal-title":"Theoretical Comput. Sci."},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-30144-8_19","volume-title":"Information Security","author":"D.P. Guelev","year":"2004","unstructured":"Guelev, D.P., Ryan, M.D., Schobbens, P.-Y.: Model-checking access control policies. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 219\u2013230. Springer, Heidelberg (2004)"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-24725-8_23","volume-title":"Programming Languages and Systems","author":"J.D. Guttman","year":"2004","unstructured":"Guttman, J.D., Thayer, F.J., Carlson, J.A., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Trust management in strand spaces: a rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 325\u2013339. Springer, Heidelberg (2004)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Jim, T.: SD3: a trust management system with certified evaluation. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 106\u2013115 (2001)","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"11_CR21","unstructured":"Li, N., Mitchell, J.C.: Understanding SPKI\/SDSI using first-order logic. In: Proceedings of the 16th IEEE Computer Security Foundation Workshop (CSFW 2003), pp. 89\u2013103 (2003)"},{"issue":"4","key":"11_CR22","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology\u00a09(4), 410\u2013442 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-44618-4_5","volume-title":"CONCUR 2000 - Concurrency Theory","author":"R.D. Nicola","year":"2000","unstructured":"Nicola, R.D., Ferrari, G., Pugliese, R.: Programming access control: The KLAIM experience. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 48\u201365. Springer, Heidelberg (2000)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Woo, T., Lam, S.: A semantic model for authentication protocols. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 178\u2013194 (1993)","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31987-0_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T23:59:59Z","timestamp":1740787199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31987-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540254355","9783540319870"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31987-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}