{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:01Z","timestamp":1775470501509,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642117466","type":"print"},{"value":"9783642117473","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_11","type":"book-chapter","created":{"date-parts":[[2010,1,25]],"date-time":"2010-01-25T01:03:02Z","timestamp":1264381382000},"page":"140-156","source":"Crossref","is-referenced-by-count":16,"title":["Category-Based Authorisation Models: Operational Semantics and Expressive Power"],"prefix":"10.1007","author":[{"given":"Clara","family":"Bertolissi","sequence":"first","affiliation":[]},{"given":"Maribel","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B.W., Plotkin, G.D.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"11_CR2","unstructured":"ANSI. RBAC, INCITS 359-2004 (2004)"},{"key":"11_CR3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139172752","volume-title":"Term rewriting and all that","author":"F. Baader","year":"1998","unstructured":"Baader, F., Nipkow, T.: Term rewriting and all that. Cambridge University Press, Great Britain (1998)"},{"key":"11_CR4","first-page":"187","volume-title":"Proceedings of the ACM Int. Conf. SACMAT 2009","author":"S. Barker","year":"2009","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of the ACM Int. Conf. SACMAT 2009, pp. 187\u2013196. ACM Press, New York (2009)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11805588_13","volume-title":"Data and Applications Security XX","author":"S. Barker","year":"2006","unstructured":"Barker, S., Fern\u00e1ndez, M.: Term rewriting for access control. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 179\u2013193. Springer, Heidelberg (2006)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-45418-7_2","volume-title":"Smart Card Programming and Security","author":"G. Barthe","year":"2001","unstructured":"Barthe, G., Dufay, G., Huisman, M., Melo de Sousa, S.: Jakarta: a toolset to reason about the JavaCard platform. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, p. 2. Springer, Heidelberg (2001)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: Unified exposition and multics interpretation. MITRE-2997 (1976)","DOI":"10.21236\/ADA023588"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Bertolissi, C., Fern\u00e1ndez, M.: Time and location based services with access control. In: Proceedings of the 2nd IFIP International Conference on New Technologies, Mobility and Security. IEEEXplore (2008)","DOI":"10.1109\/NTMS.2008.ECP.98"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-73538-0_15","volume-title":"Data and Applications Security XXI","author":"C. Bertolissi","year":"2007","unstructured":"Bertolissi, C., Fern\u00e1ndez, M., Barker, S.: Dynamic event-based access control as term rewriting. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 195\u2013210. Springer, Heidelberg (2007)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/3-540-44881-0_7","volume-title":"Rewriting Techniques and Applications (RTA 2003)","author":"M. Clavel","year":"2003","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol.\u00a02706, pp. 76\u201387. Springer, Heidelberg (2003)"},{"key":"11_CR11","volume-title":"Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP 2005)","author":"R. Echahed","year":"2005","unstructured":"Echahed, R., Prost, F.: Security policy in a declarative style. In: Proc. 7th ACM-SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP 2005). ACM Press, New York (2005)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014432","volume-title":"Recent Trends in Data Type Specification","author":"M. Fern\u00e1ndez","year":"1995","unstructured":"Fern\u00e1ndez, M., Jouannaud, J.-P.: Modular termination of term rewriting systems revisited. In: Reggio, G., Astesiano, E., Tarlecki, A. (eds.) Abstract Data Types 1994 and COMPASS 1994. LNCS, vol.\u00a0906. Springer, Heidelberg (1995)"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Richard Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM TISSEC\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM TISSEC"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.S.: Flexible support for multiple access control policies. ACM TODS\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM TODS"},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J. Joshi","year":"2005","unstructured":"Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng.\u00a017(1), 4\u201323 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/0304-3975(93)90091-7","volume":"121","author":"J.-W. Klop","year":"1993","unstructured":"Klop, J.-W., van Oostrom, V., van Raamsdonk, F.: Combinatory reduction systems, introduction and survey. Theoretical Computer Science\u00a0121, 279\u2013308 (1993)","journal-title":"Theoretical Computer Science"},{"key":"11_CR17","unstructured":"Koch, M., Mancini, L., Parisi-Presicce, F.: A graph based formalism for rbac. In: SACMAT, pp. 129\u2013187 (2004)"},{"key":"11_CR18","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: IEEE Symposium on Security and Privacy, pp. 114\u2013130 (2002)"},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0004-3702(03)00063-8","volume":"149","author":"C.-J. Liau","year":"2003","unstructured":"Liau, C.-J.: Belief, information acquisition, and trust in multi-agent systems\u2013a modal logic formulation. Artif. Intell.\u00a0149(1), 31\u201360 (2003)","journal-title":"Artif. Intell."},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"223","DOI":"10.2307\/1968867","volume":"43","author":"M.H.A. Newman","year":"1942","unstructured":"Newman, M.H.A.: On theories with a combinatorial definition of equivalence. Annals of Mathematics\u00a043(2), 223\u2013243 (1942)","journal-title":"Annals of Mathematics"},{"key":"11_CR21","unstructured":"Department of\u00a0Defense. Trusted computer system evaluation criteria (1983); DoD 5200.28-STD"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Munawer, Q.: How to do discretionary access control using roles. In: ACM Workshop on Role-Based Access Control, pp. 47\u201354 (1998)","DOI":"10.1145\/286884.286893"},{"key":"11_CR23","series-title":"Electronic Notes in Theoretical Computer Science","volume-title":"Proceedings of SECRET 2006","author":"A. Santana de Oliveira","year":"2007","unstructured":"Santana de Oliveira, A.: Rewriting-based access control policies. In: Proceedings of SECRET 2006, Venice, Italy. Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam (2007) (to appear)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Weitzner, D.J., Hendler, J., Berners-Lee, T., Connolly, D.: Creating a policy-aware web: Discretionary, rule-based access for the world wide web. In: Web and Information Security (2006)","DOI":"10.4018\/978-1-59140-588-7.ch001"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:43:27Z","timestamp":1606185807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}