{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:52Z","timestamp":1725536032765},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_15","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T07:15:46Z","timestamp":1248506146000},"page":"197-210","source":"Crossref","is-referenced-by-count":5,"title":["Security Policy Satisfiability and Failure Resilience in Workflows"],"prefix":"10.1007","author":[{"given":"Meghna","family":"Lowalekar","sequence":"first","affiliation":[]},{"given":"Ritesh Kumar","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"Kamalakar","family":"Karlapalem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Hung, P.C.K., Karlapalem, K., GrayIII, J.W.: A Study of Least Privilege in CapBasED-AMS. In: International Conference on Cooperative Information Systems, pp. 208\u2013217 (1998)","DOI":"10.1109\/COOPIS.1998.706199"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Li, N., Tripunitara, M.V., Wang, Q.: Resiliency policies in access control. In: ACM Conference on Computer and Communications Security, pp. 113\u2013123 (2006)","DOI":"10.1145\/1180405.1180421"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-74835-9_7","volume-title":"Computer Security \u2013 ESORICS 2007","author":"Q. Wang","year":"2007","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow systems. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 90\u2013105. Springer, Heidelberg (2007)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. In: Eleventh International Conference on Database Security, pp. 166\u2013181 (1997)","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Solworth, J.A.: Approvability. In: ASIACCS 2006: ACM Symposium on Information, computer and communications security, pp. 231\u2013242 (2006)","DOI":"10.1145\/1128817.1128852"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-31980-1_19","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"H. Jin","year":"2005","unstructured":"Jin, H., Han, H., Somenzi, F.: Efficient Conflict Analysis for Finding All Satisfying Assignments of a Boolean Circuit. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 287\u2013300. Springer, Heidelberg (2005)"},{"key":"15_CR7","unstructured":"http:\/\/www.ilog.com\/products\/oplstudio\/"},{"key":"15_CR8","unstructured":"http:\/\/students.iiit.ac.in\/~meghnal\/inputs\/"},{"key":"15_CR9","unstructured":"http:\/\/eaton.math.rpi.edu\/cplex90html\/pdf\/usrcplex.pdf"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"15_CR11","unstructured":"Tan, K., Crampton, J., Gunter, C.A.: The consistency of task-based authorization constraints in workflow systems. In: CSFW, p. 155 (2004)"},{"key":"15_CR12","unstructured":"Helsinger, A., Kleinmann, K., Brinn, M.: Framework to Control Emergent Survivability of Multi Agent Systems. In: AAMAS, pp. 28\u201335 (2004)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Navarro, G., Borrell, J., Ortega-Ruiz, J.A., Robles, S.: Access control with safe role assignment for mobile agents. In: AAMAS, pp. 1235\u20131236 (2005)","DOI":"10.1145\/1082473.1082710"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Kern, A., Walhorn, C.: Rule support for role-based access control. In: ACM symposium on Access control models and technologies, pp. 130\u2013138 (2005)","DOI":"10.1145\/1063979.1064002"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: SACMAT, pp. 38\u201347 (2005)","DOI":"10.1145\/1063979.1063986"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T00:04:25Z","timestamp":1590019465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}