{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:26:12Z","timestamp":1743110772670,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642001987"},{"type":"electronic","value":"9783642001994"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_4","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T09:26:36Z","timestamp":1238059596000},"page":"37-42","source":"Crossref","is-referenced-by-count":2,"title":["Idea: Action Refinement for Security Properties Enforcement"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[]},{"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","first-page":"229","volume-title":"POLICY","author":"A.K. Bandara","year":"2004","unstructured":"Bandara, A.K., Lupu, E., Moffett, J.D., Russo, A.: A goal-based approach to policy refinement. In: POLICY, pp. 229\u2013239. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Dardenne, A., Lamsweerde, A.V., Fickas, S.: Goal-directed requirements acquisition. In: Science of Computer Programming, pp. 3\u201350 (1993)","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1016\/B978-044482830-9\/50034-5","volume-title":"Handbook of Proacess Algebra","author":"R. Gorrieri","year":"2001","unstructured":"Gorrieri, R., Rensink, A., Zamboni, M.A.: Action refinement. In: Handbook of Proacess Algebra, pp. 1047\u20131147. Elsevier, Amsterdam (2001)"},{"key":"4_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-540-88479-8_16","volume-title":"ISoLA","author":"P. Greci","year":"2008","unstructured":"Greci, P., Martinelli, F., Matteucci, I.: A framework for contract-policy matching based on symbolic simulations for securing mobile device application. In: Margaria, T., Steffen, B. (eds.) ISoLA. Communications in Computer and Information Science, vol.\u00a017, pp. 221\u2013236. Springer, Heidelberg (2008)"},{"key":"4_CR5","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)"},{"key":"4_CR6","unstructured":"Carey, V.W.K., Lewis, D.: Automated policy-refinement for managing composite services. In: M-Zones White Paper June 2004, whitepaper 06\/04, Ireland (June 2004)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.entcs.2006.12.003","volume":"168","author":"F. Martinelli","year":"2007","unstructured":"Martinelli, F., Matteucci, I.: An approach for the specification, verification and synthesis of secure systems. Electr. Notes Theor. Comput. Sci.\u00a0168, 29\u201343 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"4_CR8","series-title":"Formal Models and Semantics","first-page":"1201","volume-title":"Handbook of Theoretical Computer Science, ch. 19","author":"R. Milner","year":"1990","unstructured":"Milner, R.: Operational and algebraic semantics of concurrent processes. In: van Leewen, J. (ed.) Handbook of Theoretical Computer Science, ch. 19. Formal Models and Semantics, vol.\u00a0B, pp. 1201\u20131242. The MIT Press, New York (1990)"},{"key":"4_CR9","volume-title":"Communicating and mobile systems: the \u03c0-calculus","author":"R. Milner","year":"1999","unstructured":"Milner, R.: Communicating and mobile systems: the \u03c0-calculus. Cambridge University Press, Cambridge (1999)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1007\/BFb0030640","volume-title":"TAPSOFT\u201997: Theory and Practice of Software Development","author":"A. Rensink","year":"1997","unstructured":"Rensink, A., Gorrieri, R.: Action refinement as an implementation relations. In: Bidoit, M., Dauchet, M. (eds.) CAAP 1997, FASE 1997, and TAPSOFT 1997. LNCS, vol.\u00a01214, pp. 772\u2013786. Springer, Heidelberg (1997)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11955757_18","volume-title":"B 2007: Formal Specification and Development in B","author":"N. Stouls","year":"2006","unstructured":"Stouls, N., Potet, M.L.: Security policy enforcement through refinement process. In: Julliand, J., Kouchnarenko, O. (eds.) B 2007. LNCS, vol.\u00a04355, pp. 216\u2013231. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T14:06:52Z","timestamp":1580306812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}