{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:21:19Z","timestamp":1773760879120,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540203001","type":"print"},{"value":"9783540396505","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39650-5_3","type":"book-chapter","created":{"date-parts":[[2010,6,25]],"date-time":"2010-06-25T19:20:21Z","timestamp":1277493621000},"page":"39-60","source":"Crossref","is-referenced-by-count":16,"title":["Flexible Regulation of Distributed Coalitions"],"prefix":"10.1007","author":[{"given":"Xuhui","family":"Ao","sequence":"first","affiliation":[]},{"given":"Naftaly H.","family":"Minsky","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/3-540-45263-X_9","volume-title":"Coordination Languages and Models","author":"X. Ao","year":"2000","unstructured":"Ao, X., Minsky, N., Nguyen, T., Ungureanu, V.: Law-governed communities over the internet. In: Porto, A., Roman, G.-C. (eds.) COORDINATION 2000. LNCS, vol.\u00a01906, pp. 133\u2013147. Springer, Heidelberg (2000)"},{"key":"3_CR2","unstructured":"Ao, X., Minsky, N., Ungureanu, V.: Formal treatment of certificate revocation under communal access control. In: Proc. of the 2001 IEEE Symposium on Security and Privacy, Oakland California, May 2001, pp. 116\u2013127 (2001)"},{"key":"3_CR3","unstructured":"Ao, X., Minsky, N.H., Nguyen, T.D.: A hierarchical policy specification language, and enforcement mechanism, for governing digital enterprises. In: Proc. of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, California, June 2002, pp. 38\u201349 (2002)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Belokosztolszki, A., Moody, K.: Meta-policies for distributed role-based access control systems. In: Proc. of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, California, June 2002, pp. 106\u2013115 (2002)","DOI":"10.1109\/POLICY.2002.1011298"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bidan, C., Issarny, V.: Dealing with multi-policy security in large open distributed systems. In: Proceedings of 5th European Symposium on Research in Computer Security, September 1998, pp. 51\u201366 (1998)","DOI":"10.1007\/BFb0055855"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Vimercati, S.D., Samarati, P.: A modular approach to composing access control policies. In: Proceedings of the 7th ACM conference on Computer and communications security, pp. 164\u2013173 (2000)","DOI":"10.1145\/352600.352623"},{"key":"3_CR7","volume-title":"Programming in Prolog","author":"W.F. Clocksin","year":"1981","unstructured":"Clocksin, W.F., Mellish, C.S.: Programming in Prolog. Springer, Heidelberg (1981)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Gligor, V., Khurana, H., Koleva, R., Bharadwaj, V., Baras, J.: On the negotiation of access control policies. In: Proc. of the Security Protocols Workshop, Cambridge, UK (April 2001)","DOI":"10.1007\/3-540-45807-7_28"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Gong, L., Qian, X.: Computational issues in secure interoperation. IEEE Transctions on Software Engineering, 43\u201352 (January 1996)","DOI":"10.1109\/32.481533"},{"key":"3_CR10","unstructured":"Karjoth, G.: The authorization service of tivoli policy director. In: Proc. of the 17th Annual Computer Security Applications Conference (ACSAC 2001) (December 2001) (to appear)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Khurana, H., Gligor, V., Linn, J.: Reasoning about joint administration of access policies for coalition resources. In: Proc. of IEEE Int. Conf. On Distr. Computing (ICDCS), Vienna, Austria, July 2002, pp. 429\u2013440 (2002)","DOI":"10.1109\/ICDCS.2002.1022281"},{"key":"3_CR12","unstructured":"McDaniel, P., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2002, pp. 66\u201380 (2002)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Minsky, N.H.: The imposition of protocols over open distributed systems. IEEE Transactions on Software Engineering (February 1991)","DOI":"10.1109\/32.67599"},{"key":"3_CR14","unstructured":"Minsky, N.H., Ungureanu, V.: Unified support for heterogeneous security policies in distributed systems. In: 7th USENIX Security Symposium (January 1998)"},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1145\/352591.352592","volume":"9","author":"N.H. Minsky","year":"2000","unstructured":"Minsky, N.H., Ungureanu, V.: Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. TOSEM, ACM Transactions on Software Engineering and Methodology\u00a09(3), 273\u2013305 (2000)","journal-title":"TOSEM, ACM Transactions on Software Engineering and Methodology"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A community authorization service for group collaboration. In: Proc. of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, California, June 2002, pp. 50\u201359 (2002)","DOI":"10.1109\/POLICY.2002.1011293"},{"key":"3_CR17","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley and Sons, Chichester (1996)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Shands, D., Yee, R., Jacobs, J., Sebes, E.: Secure virtual enclaves: Supporting coalition use of distributed application technologies. In: Proc. of Network and Distributed System Security Symposium, San Diego, California (February 2000)","DOI":"10.1145\/501963.501964"},{"key":"3_CR19","unstructured":"Thomson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A.: Certificate-based access control for widely distrbuted resources. In: Proceedings of 8th USENIX Security Symposium (August 1999)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Wijesekera, D., Jajodia, S.: Policy algebras for access control: the propositional case. In: Proceedings of the 8th ACM conference on Computer and communications security, pp. 38\u201347 (2001)","DOI":"10.1145\/501983.501990"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2003"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39650-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T07:43:57Z","timestamp":1740210237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39650-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540203001","9783540396505"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39650-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}