{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:49Z","timestamp":1725889909717},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705246"},{"type":"electronic","value":"9783540705253"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70525-3_7","type":"book-chapter","created":{"date-parts":[[2008,7,13]],"date-time":"2008-07-13T08:17:57Z","timestamp":1215937077000},"page":"65-80","source":"Crossref","is-referenced-by-count":8,"title":["Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic"],"prefix":"10.1007","author":[{"given":"Nora","family":"Cuppens-Boulahia","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e8ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE Policy (June 2003)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-76929-3_12","volume-title":"Advances in Computer Science \u2013 ASIAN 2007. Computer and Network Security","author":"S. Ayed","year":"2007","unstructured":"Ayed, S., Cuppens-Boulahia, N., Cuppens, F.: An Integrated Model for Access Control and Information Flow Requirements. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol.\u00a04846, pp. 111\u2013125. Springer, Heidelberg (2007)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadula, L.: Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report ESD-TR-75-306, MTR-2997, MITRE, Bedford, Mass (1975)","DOI":"10.21236\/ADA023588"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Benferhat, S., El Baida, R., Cuppens, F.: A Stratification-Based Approach for Handling Conflicts in Access Control. In: 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), Lake Come, Italy (June 2003)","DOI":"10.1145\/775412.775437"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM TISSEC\u00a04(3), 191\u2013233 (2001)","journal-title":"ACM TISSEC"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: Geo-rbac: a spatially aware rbac. In: 10th ACM SACMAT, June 1-3 (2005)","DOI":"10.1145\/1063979.1063985"},{"key":"7_CR7","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Deontic Logic in Computer Science","author":"J. Broersen","year":"2004","unstructured":"Broersen, J., Dignum, F., Meyer, J.-J., Dignum, V.: Designing a Deontic Logic of Deadlines. In: Lomuscio, A., Nute, D. (eds.) DEON 2004. LNCS (LNAI), vol.\u00a03065. Springer, Heidelberg (2004)"},{"key":"7_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/11786849_9","volume-title":"Deontic Logic and Artificial Normative Systems","author":"J. Brunel","year":"2006","unstructured":"Brunel, J., Bodeveix, J.-P., Filali, M.: A State\/Event Temporal Deontic Logic. In: Goble, L., Meyer, J.-J.C. (eds.) DEON 2006. LNCS (LNAI), vol.\u00a04048, pp. 85\u2013100. Springer, Heidelberg (2006)"},{"key":"7_CR9","unstructured":"Cholvy, L., Cuppens, F.: Reasoning about norms provided by conflicting regulations. In: McNamara, P., Prakken, H. (eds.) Fourth International Workshop on Deontic Logic in Computer Science, Bologna, Italy (1998)"},{"key":"7_CR10","unstructured":"Cuppens, F.: Roles and Deontic Logic. In: Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway (1994)"},{"key":"7_CR11","unstructured":"Cuppens, F., Autrel, F., Mi\u00e8ge, A., Benferhat, S.: Recognizing Malicious Intention in an Intrusion Detection Process. In: HIS, Santiago, Chili (2002)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2007.01.064","volume":"186","author":"F. Cuppens","year":"2007","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Ben Ghorbel, M.: High Level Conflict Management Strategies in Advanced Access Control Models. Electronic Notes in Theoretical Computer Science\u00a0186, 3\u201326 (2007)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Sans, T.: Nomad: A Security Model with Non Atomic Actions and Deadlines. In: 18th IEEE CSFW, pp. 186\u2013196 (2005)","DOI":"10.1109\/CSFW.2005.20"},{"key":"7_CR14","unstructured":"Cuppens, F., Mi\u00e8ge, A.: Modelling Contexts in the Or-BAC Model. In: ACSAC (2003)"},{"key":"7_CR15","unstructured":"Cuppens, F., Mi\u00e8ge, A.: Administration Model for Or-BAC. In: Computer Systems Science and Engineering (CSSE 2004), vol.\u00a019 (May 2004)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_7","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"H. Debar","year":"2006","unstructured":"Debar, H., Thomas, Y., Boulahia-Cuppens, N., Cuppens, F.: Using Contextual Security Policies for Threat Response. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol.\u00a04064. Springer, Heidelberg (2006)"},{"key":"7_CR17","unstructured":"Demolombe, R., Bretier, P., Louis, V.: Norms with Deadlines in Dynamic Deontic Logic. In: ECAI, Riva del Garda, Italy (September 2006)"},{"key":"7_CR18","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/11875604_58","volume-title":"Foundations of Intelligent Systems","author":"R. Demolombe","year":"2006","unstructured":"Demolombe, R., Louis, V.: Norms, Institutional Power and Roles: Towards a Logical Framework. In: Esposito, F., Ra\u015b, Z.W., Malerba, D., Semeraro, G. (eds.) ISMIS 2006. LNCS (LNAI), vol.\u00a04203, pp. 514\u2013523. Springer, Heidelberg (2006)"},{"key":"7_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11786849_10","volume-title":"Deontic Logic and Artificial Normative Systems","author":"R. Demolombe","year":"2006","unstructured":"Demolombe, R., Louis, V.: Speech Acts with Institutional Effects in Agent Societies. In: Goble, L., Meyer, J.-J.C. (eds.) DEON 2006. LNCS (LNAI), vol.\u00a04048, pp. 101\u2013114. Springer, Heidelberg (2006)"},{"key":"7_CR20","unstructured":"Ben Ghorbel, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: Managing Delegation in Access Control Models. In: 15th ADCOM (2007)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Goguen, J., Meseguer, J.: Unwinding and Inference Control. In: IEEE Symposium on Security and Privacy, Oakland (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"7_CR22","unstructured":"Harrington, J.: Network Security: A Practical Approach. TheKaufmann Series in Networking (2005)"},{"issue":"8","key":"7_CR23","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M. Harrison","year":"1976","unstructured":"Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. CACM\u00a019(8), 461\u2013471 (1976)","journal-title":"CACM"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-540-74835-9_35","volume-title":"Computer Security \u2013 ESORICS 2007","author":"M. Hilty","year":"2007","unstructured":"Hilty, M., Pretschner, A., Basin, D.A., Schaefer, C., Walter, T.: A Policy Language for Distributed Usage Control. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 531\u2013546. Springer, Heidelberg (2007)"},{"issue":"1","key":"7_CR25","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1305\/ndjfl\/1093637776","volume":"29","author":"J.-J. Meyer","year":"1988","unstructured":"Meyer, J.-J.: A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic. Notre Dame Journal of Formal Logic\u00a029(1), 109\u2013136 (1988)","journal-title":"Notre Dame Journal of Formal Logic"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/978-3-540-45248-5_6","volume-title":"Recent Advances in Intrusion Detection","author":"B. Morin","year":"2003","unstructured":"Morin, B., Debar, H.: Correlation of Intrusion Symptoms: An Application of Chronicles. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 94\u2013112. Springer, Heidelberg (2003)"},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1023\/A:1021884118023","volume":"6","author":"O. Pacheco","year":"2003","unstructured":"Pacheco, O., Carmo, J.: A Role Based Model for the Normative Specification of Organized Collective Agency and Agents Interaction. Autonomous Agents and Multi-Agent Systems\u00a06(3), 145\u2013184 (2003)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R.S.: The UCONABC usage control model. ACM Trans. Information and System Security\u00a07(1) (2004)","DOI":"10.1145\/984334.984339"},{"key":"7_CR29","series-title":"Synthese Library","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-010-1268-3","volume-title":"Action Theory and Social Science; Some Formal Models","author":"I. P\u00f6rn","year":"1977","unstructured":"P\u00f6rn, I.: Action Theory and Social Science; Some Formal Models. Synthese Library, vol.\u00a0120. D. Reidel, Dordrecht (1977)"},{"issue":"1","key":"7_CR30","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BF00370671","volume":"57","author":"H. Prakken","year":"1996","unstructured":"Prakken, H., Sergot, M.: Contrary-to-duty obligations. Studia Logica\u00a057(1), 91\u2013115 (1996)","journal-title":"Studia Logica"},{"key":"7_CR31","unstructured":"Preda, S., Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J., Toutain, L.: Reliable Process for Security Policy Deployment. In: International Conference on Security and Cryptography (Secrypt 2007), Barcelona, Spain (July 2007)"},{"issue":"2","key":"7_CR32","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"7_CR33","unstructured":"van der Torre, L.W.N.: Violated Obligations in a Defeasible Deontic Logic. In: ECAI, Amsterdam, The Netherlands (1994)"}],"container-title":["Lecture Notes in Computer Science","Deontic Logic in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70525-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T12:49:05Z","timestamp":1557665345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70525-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705246","9783540705253"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70525-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}