{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:59:14Z","timestamp":1725544754156},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117466"},{"type":"electronic","value":"9783642117473"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_10","type":"book-chapter","created":{"date-parts":[[2010,1,24]],"date-time":"2010-01-24T20:03:02Z","timestamp":1264363382000},"page":"123-139","source":"Crossref","is-referenced-by-count":10,"title":["Model-Driven Security Policy Deployment: Property Oriented Approach"],"prefix":"10.1007","author":[{"given":"Stere","family":"Preda","sequence":"first","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Toutain","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Abou el Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e8ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks, Lake Come, Italy, pp. 120\u2013131 (2003)"},{"key":"10_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511624162","volume-title":"The B-Book \u2014 Assigning Programs to Meanings","author":"J.R. Abrial","year":"1996","unstructured":"Abrial, J.R.: The B-Book \u2014 Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/3-540-44880-2_27","volume-title":"ZB 2003: Formal Specification and Development in Z and B","author":"J.R. Abrial","year":"2003","unstructured":"Abrial, J.R., Cansell, D., M\u00e9ry, D.: Formal Derivation of Spanning Trees Algorithms. In: Bert, D., Bowen, J.P., King, S. (eds.) ZB 2003. LNCS, vol.\u00a02651, pp. 457\u2013476. Springer, Heidelberg (2003)"},{"key":"10_CR4","unstructured":"Autrel, F., Cuppens, F., Cuppens-Boulahia, N., Coma, C.: MotOrBAC\u00a02: A security policy tool. In: SAR-SSI 2008, Loctudy, France (2008)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bartal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. In: IEEE Symposium on Security and Privacy, pp. 17\u201331 (1999)","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/11955757_19","volume-title":"B 2007: Formal Specification and Development in B","author":"N. Benaissa","year":"2006","unstructured":"Benaissa, N., Cansell, D., M\u00e9ry, D.: Integration of Security Policy into System Modeling. In: Julliand, J., Kouchnarenko, O. (eds.) B 2007. LNCS, vol.\u00a04355, pp. 232\u2013247. Springer, Heidelberg (2006)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Capretta, V., Stepien, B., Felty, A., Matwin, S.: Formal correctness of conflict detection for firewalls. In: ACM workshop on Formal methods in security engineering, FMSE 2007, Virginia, USA, pp. 22\u201330 (2007)","DOI":"10.1145\/1314436.1314440"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Baldwin, A., Goh, C.: POWER prototype: towards integrated policy-based management. In: Network Operations and Management Symposium, USA, pp. 789\u2013802 (2000)","DOI":"10.1109\/NOMS.2000.830429"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2007.01.064","volume":"186","author":"F. Cuppens","year":"2007","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Ben Ghorbel, M.: High level conflict management strategies in advanced access control models. Electronic Notes in Theoretical Computer Science (ENTCS)\u00a0186, 3\u201326 (2007)","journal-title":"Electronic Notes in Theoretical Computer Science (ENTCS)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"key":"10_CR11","first-page":"79","volume-title":"FACIT 1999","author":"R. Fraer","year":"1999","unstructured":"Fraer, R.: Minimum Spanning Tree. In: FACIT 1999, pp. 79\u2013114. Springer, Heidelberg (1999)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wu, S.F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C.: IPSec\/VPN Security Policy: Correctness, Conflict Detection and Resolution. In: Policy 2001 Workshop, Bristol, UK, pp. 39\u201356 (2001)","DOI":"10.1007\/3-540-44569-2_3"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10207-007-0045-7","volume":"7","author":"J. Garcia-Alfaro","year":"2008","unstructured":"Garcia-Alfaro, J., Cuppens, N., Cuppens, F.: Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies. International Journal of Information Security\u00a07(2), 103\u2013122 (2008)","journal-title":"International Journal of Information Security"},{"key":"10_CR14","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2004","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, New York (2004)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J., Schreck, J., Bartmann, P.: Model-based security analysis for mobile communications. In: 30th international conference on Software engineering, Leipzig, Germany, pp. 683\u2013692 (2008)","DOI":"10.1145\/1368088.1368186"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Laborde, R., Kamel, M., Barrere, F., Benzekri, A.: Implementation of a Formal Security Policy Refinement Process in WBEM Architecture. Journal of Network and Systems Management\u00a015(2) (2007)","DOI":"10.1007\/s10922-007-9063-z"},{"issue":"1","key":"10_CR17","first-page":"69","volume":"4","author":"S. Ioannidis","year":"2007","unstructured":"Ioannidis, S., Bellovin, S.M., Ioannidis, J., Keromitis, A.D., Anagnostakis, K., Smith, J.M.: Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. International Journal of Network Security\u00a04(1), 69\u201380 (2007)","journal-title":"International Journal of Network Security"},{"key":"10_CR18","first-page":"363","volume-title":"Sci. Comput. Program.","author":"O. Ponsini","year":"2005","unstructured":"Ponsini, O., F\u00e9d\u00e8le, C., Kounalis, E.: Rewriting of imperative programs into logical equations. In: Sci. Comput. Program., vol.\u00a054, pp. 363\u2013401. Elsevier North-Holland, Inc., Amsterdam (2005)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Preda, S., Cuppens, F., Cuppens-Boulahia, N., Alfaro, J.G., Toutain, L., Elrakaiby, Y.: A Semantic Context Aware Security Policy Deployment. In: ACM Symposium on Information, Computer and Communication Security (ASIACCS 2009), Sydney, Australia (March 2009)","DOI":"10.1145\/1533057.1533092"},{"issue":"2","key":"10_CR20","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Unal, D., Ufuk \u00c7aglayan, M.: Theorem proving for modeling and conflict checking of authorization policies. In: Proceedings of the International Symposium on Computer Networks, ISCN, Istanbul, Turkey (2006)","DOI":"10.1109\/ISCN.2006.1662524"},{"key":"10_CR22","unstructured":"ACI DESIRS project: D\u00c9veloppement de Syst\u00e8mes Informatiques par Raffinement des contraintes S\u00e9curitaires"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:43:27Z","timestamp":1606167807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}