{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:06:34Z","timestamp":1725537994010},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047657"},{"type":"electronic","value":"9783642047664"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04766-4_17","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T05:55:53Z","timestamp":1252994153000},"page":"239-254","source":"Crossref","is-referenced-by-count":9,"title":["Towards Practical Enforcement Theories"],"prefix":"10.1007","author":[{"given":"Nataliia","family":"Bielova","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Micheletti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"17_CR1","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/0020-0190(85)90056-0","volume":"21","author":"B. Alpern","year":"1985","unstructured":"Alpern, B., Schneider, F.B.: Defining liveness. Inform. Processing Letters\u00a021(4), 181\u2013185 (1985)","journal-title":"Inform. Processing Letters"},{"issue":"1-2","key":"17_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"L. Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. Int. J. of Inform. Sec.\u00a04(1-2), 2\u201316 (2005)","journal-title":"Int. J. of Inform. Sec."},{"key":"17_CR3","first-page":"287","volume-title":"Proc. of the FAST 2009 workshop","author":"N. Bielova","year":"2008","unstructured":"Bielova, N., Massacci, F.: Do you really mean what you actually enforced? In: Proc. of the FAST 2009 workshop, vol.\u00a05491, pp. 287\u2013301. Springer, Heidelberg (2008)"},{"key":"17_CR4","unstructured":"Erlingsson, U.: The Inlined Reference Monitor Approach to Security Policy Enforcement. Technical report 2003-1916, Department of Computer Science, Cornell University (2003)"},{"key":"17_CR5","first-page":"43","volume-title":"Proc. of Symp. on Sec. and Privacy","author":"P.W.L. Fong","year":"2004","unstructured":"Fong, P.W.L.: Access control by tracking shallow execution history. In: Proc. of Symp. on Sec. and Privacy, pp. 43\u201355. IEEE, Los Alamitos (2004)"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. TOPLAS\u00a028(1), 175\u2013205 (2006)","journal-title":"TOPLAS"},{"key":"17_CR7","first-page":"7","volume-title":"Proc. of the workshop on Prog. Lang. and analysis for security (PLAS 2006)","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Certified in-lined reference monitoring on .net. In: Proc. of the workshop on Prog. Lang. and analysis for security (PLAS 2006), pp. 7\u201316. ACM Press, New York (2006)"},{"issue":"2","key":"17_CR8","first-page":"125","volume":"3","author":"L. Lamport","year":"1977","unstructured":"Lamport, L.: Proving the correctness of multiprocess programs. TSE\u00a0SE-3(2), 125\u2013143 (1977)","journal-title":"TSE"},{"key":"17_CR9","unstructured":"Ligatti, J.: Policy Enforcement via Program Monitoring. PhD thesis, Princeton University (2006)"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J. Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Transactions on Inf. and Sys. Sec. (TISSEC)\u00a012(3), 1\u201341 (2009)","journal-title":"ACM Transactions on Inf. and Sys. Sec. (TISSEC)"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Transactions on Inf. and Sys. Sec. (TISSEC)\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Transactions on Inf. and Sys. Sec. (TISSEC)"},{"issue":"2-4","key":"17_CR12","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ic.2007.07.009","volume":"206","author":"C. Talhi","year":"2007","unstructured":"Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inform. and Comp.\u00a0206(2-4), 158\u2013184 (2007)","journal-title":"Inform. and Comp."}],"container-title":["Lecture Notes in Computer Science","Identity and Privacy in the Internet Age"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04766-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T18:30:26Z","timestamp":1552156226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04766-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047657","9783642047664"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04766-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}