{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:30Z","timestamp":1763467890509},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705246"},{"type":"electronic","value":"9783540705253"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70525-3_9","type":"book-chapter","created":{"date-parts":[[2008,7,13]],"date-time":"2008-07-13T12:17:57Z","timestamp":1215951477000},"page":"96-109","source":"Crossref","is-referenced-by-count":21,"title":["Variations in Access Control Logic"],"prefix":"10.1007","author":[{"given":"Mart\u00edn","family":"Abadi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M.: Logic in access control. In: Proceedings of the Eighteenth Annual IEEE Symposium on Logic in Computer Science, pp. 228\u2013233 (2003)","DOI":"10.1109\/LICS.2003.1210062"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.entcs.2007.02.002","volume":"172","author":"M. Abadi","year":"2007","unstructured":"Abadi, M.: Access control in a core calculus of dependency. Electronic Notes in Theoretical Computer Science\u00a0172, 5\u201331 (2007); Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Abadi, M., Banerjee, A., Heintze, N., Riecke, J.G.: A core calculus of dependency. In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pp. 147\u2013160 (January 1999)","DOI":"10.1145\/292540.292555"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 81\u201395 (May 2005)","DOI":"10.1109\/SP.2005.9"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium, pp. 3\u201315 (2007)","DOI":"10.1109\/CSF.2007.18"},{"key":"9_CR7","first-page":"2208","volume-title":"The Computer Science and Engineering Handbook, ch.103","author":"L. Cardelli","year":"1997","unstructured":"Cardelli, L.: Type systems. In: Tucker, A.B. (ed.) The Computer Science and Engineering Handbook, ch.103, pp. 2208\u20132236. CRC Press, Boca Raton (1997)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do as I SaY! programmatic access control with explicit identities. In: 20th IEEE Computer Security Foundations Symposium, pp. 16\u201330 (July 2007)","DOI":"10.1109\/CSF.2007.19"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 105\u2013113 (May 2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1997.2627","volume":"137","author":"M. Fairtlough","year":"1997","unstructured":"Fairtlough, M., Mendler, M.: Propositional lax logic. Information and Computation\u00a0137(1), 1\u201333 (1997)","journal-title":"Information and Computation"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization in distributed systems. In: 20th IEEE Computer Security Foundations Symposium, pp. 31\u201345 (2007)","DOI":"10.1109\/CSF.2007.7"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Garg, D., Pfenning, F.: Non-interference in constructive authorization logic. In: 19th IEEE Computer Security Foundations Workshop, pp. 283\u2013296 (2006)","DOI":"10.1109\/CSFW.2006.18"},{"key":"9_CR13","unstructured":"Girard, J.-Y.: Interpr\u00e9tation Fonctionnelle et Elimination des Coupures de l\u2019Arithm\u00e9tique d\u2019Ordre Sup\u00e9rieur. Th\u00e8se de doctorat d\u2019\u00e9tat, Universit\u00e9 Paris VII (June 1972)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Gurevich, Y., Neeman, I.: DKAL: Distributed-knowledge authorization language. Technical Report MSR-TR-2007-116, Microsoft Research (August 2007)","DOI":"10.1109\/CSF.2008.8"},{"key":"9_CR15","unstructured":"Hughes, G.E., Cresswell, M.J.: An Introduction to Modal Logic. Methuen Inc., New York (1968)"},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"9_CR17","unstructured":"Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems, pp. 437\u2013443 (1971)"},{"issue":"6","key":"9_CR18","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2004.17","volume":"37","author":"B.W. Lampson","year":"2004","unstructured":"Lampson, B.W.: Computer security in the real world. IEEE Computer\u00a037(6), 37\u201346 (2004)","journal-title":"IEEE Computer"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Lesniewski-Laas, C., Ford, B., Strauss, J., Kaashoek, M.F., Morris, R.: Alpaca: extensible authorization for distributed services. In: 14th ACM Conference on Computer and Communications Security, pp. 432\u2013444 (2007)","DOI":"10.1145\/1315245.1315299"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"9_CR21","first-page":"55","volume":"93","author":"E. Moggi","year":"1991","unstructured":"Moggi, E.: Notions of computation and monads. Information and Control\u00a093(1), 55\u201392 (1991)","journal-title":"Information and Control"},{"issue":"9","key":"9_CR22","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J.H. Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer system. Proceedings of the IEEE\u00a063(9), 1278\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"key":"9_CR23","unstructured":"Tse, S., Zdancewic, S.: Translating dependency into parametricity. Journal of Functional Programming (to appear)"}],"container-title":["Lecture Notes in Computer Science","Deontic Logic in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70525-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T16:48:59Z","timestamp":1557679739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70525-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705246","9783540705253"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70525-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}