{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:10:29Z","timestamp":1725538229350},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041549"},{"type":"electronic","value":"9783642041556"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04155-6_23","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T08:04:42Z","timestamp":1254211482000},"page":"301-316","source":"Crossref","is-referenced-by-count":1,"title":["System Support for Forensic Inference"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Gehani","sequence":"first","affiliation":[]},{"given":"Florent","family":"Kirchner","sequence":"additional","affiliation":[]},{"given":"Natarajan","family":"Shankar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1-2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3233\/JCS-1998-61-202","volume":"6","author":"M. Abadi","year":"1998","unstructured":"M. Abadi, On SDSI\u2019s linked local name spaces, Journal of Computer Security, vol. 6(1-2), pp. 3\u201321, 1998.","journal-title":"Journal of Computer Security"},{"key":"23_CR2","unstructured":"V. Bernat, H. Ruess and N. Shankar, First-Order CyberLogic, Technical Report, SRI International, Menlo Park, California (ftp.csl.sri .com\/pub\/users\/shankar\/cyberlogic-report.pdf), 2005."},{"key":"23_CR3","unstructured":"Court of Appeals of the District of Columbia, Frye v. United States, Federal Reporter, vol. 293, pp. 1013\u20131014, 1924."},{"key":"23_CR4","unstructured":"GENI Project Office, Global Environment for Network Innovations, BBN Technologies, Cambridge, Massachusetts (www.geni.net)."},{"key":"23_CR5","unstructured":"International Business Machines, Security policy definition, Armonk, New York (www-935.ibm.com\/services\/us\/index.wss\/offer ing\/gbs\/a1002391)."},{"issue":"1","key":"23_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B. Lampson","year":"1974","unstructured":"B. Lampson, Protection, ACM Operating Systems Reviews, vol. 8(1), pp. 18\u201324, 1974.","journal-title":"ACM Operating Systems Reviews"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Computer Security - ESORICS 96","author":"U. Maurer","year":"1996","unstructured":"U. Maurer, Modeling a public key infrastructure, Proceedings of the Fourth European Symposium on Research in Computer Security, pp. 325\u2013350, 1996."},{"key":"23_CR8","unstructured":"J. Moschovakis, Intuitionistic logic, Stanford Encyclopedia of Philosophy, Metaphysics Research Laboratory, Stanford University, Palo Alto, California (plato.stanford.edu\/entries\/logic-intuitionistic)."},{"issue":"1","key":"23_CR9","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF00881902","volume":"11","author":"G. Nadathur","year":"1993","unstructured":"G. Nadathur, A proof procedure for the logic of hereditary Harrop formulas, Journal of Automated Reasoning, vol. 11(1), pp. 115\u2013145, 1993.","journal-title":"Journal of Automated Reasoning"},{"key":"23_CR10","volume-title":"The Ways of Paradox","author":"W. Quine","year":"1962","unstructured":"W. Quine, The Ways of Paradox, Harvard University Press, Cambridge, Massachusetts, 1962."},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"M. Reiter and S. Stubblebine, Toward acceptable metrics of authentication, Proceedings of the IEEE Symposium on Security and Privacy, pp. 10\u201320, 1997.","DOI":"10.1109\/SECPRI.1997.601308"},{"key":"23_CR12","unstructured":"SourceForge, FUSE: Filesystem in userspace (fuse.sourceforge.net)."},{"key":"23_CR13","unstructured":"Sun Microsystems, Security policy services, Santa Clara, California (www.sun.com\/service\/security\/securitypolicyservices.xml)."},{"key":"23_CR14","unstructured":"Supreme Court of Texas, Merrell Dow Pharmaceuticals, Inc. v. Havner, South Western Reporter, vol. 953(S.W.2d), pp. 706\u2013733, 1998."},{"key":"23_CR15","unstructured":"Trusted Computing Group, Beaverton, Oregon (www.trustedcomp utinggroup.org)."},{"issue":"3","key":"23_CR16","first-page":"1936","volume":"110","author":"U.S. Government","year":"1997","unstructured":"U.S. Government, Health Insurance Portability and Accountability Act, Public Law 104\u2013191, United States Statutes at Large, vol. 110(3), pp. 1936\u20132103, 1997.","journal-title":"United States Statutes at Large"},{"issue":"2","key":"23_CR17","first-page":"1338","volume":"113","author":"U.S. Government","year":"2000","unstructured":"U.S. Government, Gramm-Leach-Bliley Act, Public Law 106\u2013102, 106th Congress, United States Statutes at Large, vol. 113(2), pp. 1338\u20131481, 2000.","journal-title":"United States Statutes at Large"},{"issue":"1","key":"23_CR18","first-page":"745","volume":"116","author":"U.S. Government","year":"2003","unstructured":"U.S. Government, Sarbanes-Oxley Act, Public Law 107\u2013204, 107th Congress, United States Statutes at Large, vol. 116(1), pp. 745\u2013810, 2003.","journal-title":"United States Statutes at Large"},{"key":"23_CR19","first-page":"579","volume":"509","author":"U.S. Supreme Court","year":"1983","unstructured":"U.S. Supreme Court, Daubert v. Merrell Dow Pharmaceuticals, Inc., United States Reports, vol. 509, pp. 579\u2013601, 1983.","journal-title":"United States Reports"},{"key":"23_CR20","first-page":"1879","volume-title":"From Frege to Godel: A Source Book in Mathematical Logic","author":"J. Heijenoort van","year":"1967","unstructured":"J. van Heijenoort, From Frege to Godel: A Source Book in Mathematical Logic 1879\u20131931, Harvard University Press, Cambridge, Massachusetts, 1967."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04155-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T19:30:29Z","timestamp":1552159829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04155-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041549","9783642041556"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04155-6_23","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}