{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:50:19Z","timestamp":1725537019431},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642034589"},{"type":"electronic","value":"9783642034596"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03459-6_4","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T23:16:08Z","timestamp":1251501368000},"page":"52-69","source":"Crossref","is-referenced-by-count":8,"title":["Usage Automata"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, San Diego, California, USA, The Internet Society (2003)"},{"key":"4_CR2","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Local policies for resource usage analysis. To appear in ACM Tran. Programming Languages and Systems"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-71389-0_4","volume-title":"Foundations of Software Science and Computational Structures","author":"M. Bartoletti","year":"2007","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.-L., Zunino, R.: Types and effects for resource usage analysis. In: Seidl, H. (ed.) FOSSACS 2007. LNCS, vol.\u00a04423, pp. 32\u201347. Springer, Heidelberg (2007)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-00945-7_2","volume-title":"Proceedings of the 4th Trustworthy Global Computing","author":"M. Bartoletti","year":"2009","unstructured":"Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Model checking usage policies. In: Proceedings of the 4th Trustworthy Global Computing, Barcelona, Spain. LNCS, vol.\u00a05474, pp. 19\u201335. Springer, Heidelberg (2009)"},{"key":"4_CR5","unstructured":"Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Proceedings of the Workshop on Foundations of Computer Security (FCS) (2002)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/1065010.1065047","volume-title":"Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI)","author":"L. Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Composing security policies with Polymer. In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI), Chicago, USA, pp. 305\u2013314. ACM, New York (2005)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese Wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_19","volume-title":"Secure Internet Programming","author":"G. Edjlali","year":"1999","unstructured":"Edjlali, G., Acharya, A., Chaudhary, V.: History-based access control for mobile code. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603. Springer, Heidelberg (1999)"},{"key":"4_CR9","first-page":"43","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P 2004)","author":"P.W. Fong","year":"2004","unstructured":"Fong, P.W.: Access control by tracking shallow execution history. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2004), Berkeley, CA, USA, May 9-12, pp. 43\u201355. IEEE Computer Society, Los Alamitos (2004)"},{"key":"4_CR10","volume-title":"Inside Java 2 platform security: architecture, API design, and implementation","author":"L. Gong","year":"1999","unstructured":"Gong, L.: Inside Java 2 platform security: architecture, API design, and implementation. Addison-Wesley, Reading (1999)"},{"issue":"1","key":"4_CR11","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, J.G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. on Programming Languages and Systems\u00a028(1), 175\u2013205 (2006)","journal-title":"ACM Trans. on Programming Languages and Systems"},{"key":"4_CR12","first-page":"331","volume-title":"Proceedings of the 29th Annual Symposium on Principles of Programming Languages, (POPL)","author":"A. Igarashi","year":"2002","unstructured":"Igarashi, A., Kobayashi, N.: Resource usage analysis. In: Proceedings of the 29th Annual Symposium on Principles of Programming Languages (POPL), pp. 331\u2013342. ACM, New York (2002)"},{"key":"4_CR13","unstructured":"Jalapa: Securing Java with Local Policies, \n                  \n                    http:\/\/jalapa.sourceforge.net"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-74810-6_5","volume-title":"Foundations of Security Analysis and Design IV","author":"F. Martinelli","year":"2007","unstructured":"Martinelli, F., Mori, P.: Enhancing java security with history based access control. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol.\u00a04677, pp. 135\u2013159. Springer, Heidelberg (2007)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/3-540-48743-3_21","volume-title":"ECOOP \u201999 - Object-Oriented Programming","author":"R. Pandey","year":"1999","unstructured":"Pandey, R., Hashii, B.: Providing fine-grained access control for java programs. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol.\u00a01628, pp. 449\u2013473. Springer, Heidelberg (1999)"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. on Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Trans. on Information and System Security"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-30477-7_8","volume-title":"Programming Languages and Systems","author":"C. Skalka","year":"2004","unstructured":"Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol.\u00a03302, pp. 107\u2013128. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Applications of Security Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03459-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T11:00:01Z","timestamp":1552129201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03459-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642034589","9783642034596"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03459-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}