{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:55:32Z","timestamp":1742961332226,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748342"},{"type":"electronic","value":"9783540748359"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74835-9_14","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T14:03:08Z","timestamp":1189173788000},"page":"203-218","source":"Crossref","is-referenced-by-count":10,"title":["A Logic for State-Modifying Authorization Policies"],"prefix":"10.1007","author":[{"given":"Moritz Y.","family":"Becker","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Nanz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 185\u2013210. Springer, Heidelberg (1999)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Nanz, S.: A logic for state-modifying authorization policies. Technical Report MSR-TR-2007-32, Microsoft Research (2007)","DOI":"10.1007\/978-3-540-74835-9_14"},{"issue":"2","key":"14_CR3","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/0304-3975(94)90190-2","volume":"133","author":"A.J. Bonner","year":"1994","unstructured":"Bonner, A.J., Kifer, M.: An overview of transaction logic. Theoretical Computer Science\u00a0133(2), 205\u2013265 (1994)","journal-title":"Theoretical Computer Science"},{"key":"14_CR4","unstructured":"Shanahan, M.: Prediction is deduction but explanation is abduction. In: International Joint Conference on Artificial Intelligence, pp. 1055\u20131060 (1989)"},{"issue":"6","key":"14_CR5","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"A.C. Kakas","year":"1992","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive logic programming. Journal of Logic and Computation\u00a02(6), 719\u2013770 (1992)","journal-title":"Journal of Logic and Computation"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Tamaki, H., Sato, T.: OLD resolution with tabulation. In: Third international conference on logic programming, pp. 84\u201398 (1986)","DOI":"10.1007\/3-540-16492-8_66"},{"key":"14_CR7","unstructured":"Dietrich, S.W.: Extension tables: Memo relations in logic programming. In: Symposium on Logic Programming, pp. 264\u2013272 (1987)"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/227595.227597","volume":"43","author":"W. Chen","year":"1996","unstructured":"Chen, W., Warren, D.S.: Tabled evaluation with delaying for general logic programs. Journal of the ACM\u00a043(1), 20\u201374 (1996)","journal-title":"Journal of the ACM"},{"issue":"3\/4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1023\/A:1009799613661","volume":"2","author":"D. Toman","year":"1997","unstructured":"Toman, D.: Memoing evaluation for constraint extensions of Datalog. Constraints\u00a02(3\/4), 337\u2013359 (1997)","journal-title":"Constraints"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/CSFW.2004.1310738","volume-title":"17th IEEE Computer Security Foundations Workshop (CSFW)","author":"M.Y. Becker","year":"2004","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Flexible trust management, applied to electronic health records. In: 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 139\u2013154. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: Design and semantics of a decentralized authorization language. In: Computer Security Foundations Symposium (2007)","DOI":"10.1109\/CSF.2007.18"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Becker, M.Y.: Information governance in NHS\u2019s NPfIT: A case for policy specification. International Journal of Medical Informatics\u00a076(5-6) (2007)","DOI":"10.1016\/j.ijmedinf.2006.09.008"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Computer Security \u2013 ESORICS 2004","author":"S. Chen","year":"2004","unstructured":"Chen, S., Wijesekera, D., Jajodia, S.: Incorporating dynamic constraints in the flexible authorization framework. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 1\u201316. Springer, Heidelberg (2004)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Jagadeesan, R., Marrero, W., Pitcher, C., Saraswat, V.: Timed constraint programming: a declarative approach to usage control. In: International Conference on Principles and Practice of Declarative Programming, pp. 164\u2013175 (2005)","DOI":"10.1145\/1069774.1069790"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder policy specification language. In: International Workshop on Policies for Distributed Systems and Networks, pp. 18\u201338 (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"14_CR16","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0 core specification (2005)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Li, N., Tripunitara, M.V.: Security analysis in role-based access control. In: Symposium on Access Control Models and Technologies, pp. 126\u2013135 (2004)","DOI":"10.1145\/990036.990058"},{"issue":"3","key":"14_CR18","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1145\/1066100.1066103","volume":"52","author":"N. Li","year":"2005","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM\u00a052(3), 474\u2013514 (2005)","journal-title":"Journal of the ACM"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy analysis for administrative role based access control. In: Workshop on Computer Security Foundations, pp. 124\u2013138 (2006)","DOI":"10.1109\/CSFW.2006.22"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/266741.266752","volume-title":"2nd ACM Workshop on Role-Based Access Control","author":"R. Sandhu","year":"1997","unstructured":"Sandhu, R., Bhamidipati, V., Coyne, E., Canta, S., Youman, C.: The ARBAC97 model for role-based administration of roles: Preliminary description and outline. In: 2nd ACM Workshop on Role-Based Access Control, pp. 41\u201354. ACM Press, New York (1997)"},{"key":"14_CR21","unstructured":"Jha, S., Reps, T.: Analysis of SPKI\/SDSI certificates using model checking. In: Computer Security Foundations Workshop (2002)"},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Trans. Inf. Syst. Secur.\u00a06(1), 71\u2013127 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","first-page":"196","volume-title":"Software Engineering Education in the Modern Age","author":"K. Fisler","year":"2006","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, vol.\u00a04309, pp. 196\u2013205. Springer, Heidelberg (2006)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Pucella, R., Weissman, V.: Reasoning about dynamic policies. In: Foundations of Software Science and Computation Structures, pp. 453\u2013467 (2004)","DOI":"10.1007\/978-3-540-24727-2_32"},{"key":"14_CR25","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1007\/11814771_51","volume-title":"Automated Reasoning","author":"D.J. Dougherty","year":"2006","unstructured":"Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Specifying and reasoning about dynamic access-control policies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), vol.\u00a04130, pp. 632\u2013646. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74835-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T21:43:41Z","timestamp":1737409421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74835-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748342","9783540748359"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74835-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}