{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:27:39Z","timestamp":1767374859156},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540899815"},{"type":"electronic","value":"9783540899822"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89982-2_7","type":"book-chapter","created":{"date-parts":[[2008,12,14]],"date-time":"2008-12-14T22:09:15Z","timestamp":1229292555000},"page":"22-36","source":"Crossref","is-referenced-by-count":17,"title":["Authorization and Obligation Policies in Dynamic Systems"],"prefix":"10.1007","author":[{"given":"Michael","family":"Gelfond","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Lobo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543357","volume-title":"Knowledge Representation, Reasoning and Declarative Problem Solving","author":"C. Baral","year":"2003","unstructured":"Baral, C.: Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press, Cambridge (2003)"},{"key":"7_CR2","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proceedings of ICLP 1988, pp. 1070\u20131080 (1988)"},{"key":"7_CR3","unstructured":"Bandara, A., Calo, S., Lobo, J., Lupu, E., Russo, A., Sloman, M.: Toward a formal characterization of policy specification and analysis. In: Electronic Proceedings of the Annual Conference of ITA, ACITA (2007)"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-1-4615-1567-8_12","volume-title":"Logic-Based Artificial Intelligence","author":"C. Baral","year":"2000","unstructured":"Baral, C., Gelfond, M.: Reasoning agents in dynamic domains. In: Minker, J. (ed.) Logic-Based Artificial Intelligence, pp. 257\u2013279. Kluwer Academic, Dordrecht (2000)"},{"issue":"1-3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0743-1066(96)00125-2","volume":"31","author":"H. Turner","year":"1997","unstructured":"Turner, H.: Representing actions in logic programs and default theories: A situation calculus approach. J. Log. Program.\u00a031(1-3), 245\u2013298 (1997)","journal-title":"J. Log. Program."},{"key":"7_CR6","unstructured":"Balduccini, M., Gelfond, M.: The aaa architecture: An overview. In: AAAI Spring Symposium 2008 on Architectures for Intelligent Theory-Based Agents, AITA 2008 (2008)"},{"key":"7_CR7","unstructured":"OASIS Standard: extensible access control markup language (XACML) v2.0 (2005)"},{"key":"7_CR8","unstructured":"Barker, S.: Security policy specification in logic. In: Proc. of Int. Conf. on Artificial Intelligence, pp. 143\u2013148 (June 2000)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Proc. of the ACM Int. SIGMOD Conf. on Management of Data (May 1997)","DOI":"10.1145\/253260.253364"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.: A logical language for expressing authorizations. In: Proc. of the IEEE Symposium on Security and Privacy, p. 31 (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst.\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Trans. Database Syst."},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-30108-0_1","volume-title":"Computer Security \u2013 ESORICS 2004","author":"S. Chen","year":"2004","unstructured":"Chen, S., Wijesekera, D., Jajodia, S.: Incorporating dynamic constraints in the flexible authorization framework. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 1\u201316. Springer, Heidelberg (2004)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Stoller, S.D., Yang, P., Ramakrishnan, C.R., Gofman, M.I.: Efficient policy analysis for administrative role based access control. In: ACM Conference on Computer and Communications Security, pp. 445\u2013455 (2007)","DOI":"10.1145\/1315245.1315300"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kolovski, V., Hendler, J.A., Parsia, B.: Analyzing web access control policies. In: WWW, pp. 677\u2013686 (2007)","DOI":"10.1145\/1242572.1242664"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Halpern, J.Y., Weissman, V.: Using first-order logic to reason about policies. In: Proc. of 16th IEEE Computer Security Foundations Workshop, pp. 251\u2013265 (2003)","DOI":"10.1109\/CSFW.2003.1212713"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-540-74835-9_25","volume-title":"Computer Security \u2013 ESORICS 2007","author":"D.J. Dougherty","year":"2007","unstructured":"Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Obligations and their interaction with programs. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 375\u2013389. Springer, Heidelberg (2007)"},{"key":"7_CR17","unstructured":"Craven, R., Lobo, J., Lupu, E., Ma, J., Russo, A., Sloman, M., Bandara, A.: A formal framework for policy analysis. Technical Report, Department of Computing, Imperial College, London (2008)"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"R. Kowalski","year":"1986","unstructured":"Kowalski, R., Sergot, M.: A logic-based calculus of events. New Generation Computing\u00a04, 67\u201395 (1986)","journal-title":"New Generation Computing"},{"issue":"1-3","key":"7_CR19","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0743-1066(99)00075-8","volume":"44","author":"A.C. Kakas","year":"2000","unstructured":"Kakas, A.C., Michael, A., Mourlas, C.: ACLP: Abductive constraint logic programming. J. Log. Program.\u00a044(1-3), 129\u2013177 (2000)","journal-title":"J. Log. Program."},{"issue":"2-3","key":"7_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","volume":"2","author":"T.Y.C. Woo","year":"1993","unstructured":"Woo, T.Y.C., Lam, S.S.: Authorizations in distributed systems: A new approach. Journal of Computer Security\u00a02(2-3), 107\u2013136 (1993)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89982-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T05:50:13Z","timestamp":1548395413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89982-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540899815","9783540899822"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89982-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}