{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:13:31Z","timestamp":1776122011406,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642137389","type":"print"},{"value":"9783642137396","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_20","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"295-302","source":"Crossref","is-referenced-by-count":5,"title":["Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems"],"prefix":"10.1007","author":[{"given":"Hasan","family":"Qunoo","sequence":"first","affiliation":[]},{"given":"Mark","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Qunoo, H., Ryan, M.: Modelling dynamic access control policies for web-based collaborative systems - long version. Technical report, School of Computer Science, University of Birmingham, Available at the authors\u2019 webpage (April 2010)","DOI":"10.1007\/978-3-642-13739-6_20"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Becker, M., Fournet, C., Gordon, A.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, pp. 3\u201315 (2007)","DOI":"10.1109\/CSF.2007.18"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Becker, M.Y.: Specification and analysis of dynamic authorisation policies. IEEE Computer Security Foundations Symposium, 203\u2013217 (2009)","DOI":"10.1109\/CSF.2009.14"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"key":"20_CR5","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/CSF.2008.8","volume-title":"CSF 2008: Proceedings of the 2008, 21st IEEE Computer Security Foundations Symposium","author":"Y. Gurevich","year":"2008","unstructured":"Gurevich, Y., Neeman, I.: DKAL: Distributed-knowledge authorization language. In: CSF 2008: Proceedings of the 2008, 21st IEEE Computer Security Foundations Symposium, Washington, DC, USA, pp. 149\u2013162. IEEE Computer Society, Los Alamitos (2008)"},{"key":"20_CR6","unstructured":"Gurevich, Y., Neeman, I.: DKAL 2: A simplified and improved authorization language. Technical report, Microsoft Research - Cambridge (2009)"},{"key":"20_CR7","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proc. IEEE Symposium on Security and Privacy, Oakland (May 2002)"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/0004-3702(80)90012-0","volume":"13","author":"D. McDermott","year":"1980","unstructured":"McDermott, D., Doyle, J.: Nonmonotonic logic 1. Artificial Intelligence\u00a013, 41\u201372 (1980)","journal-title":"Artificial Intelligence"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY (2004)","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1029133.1029141","volume-title":"2004 ACM Workshop on Formal Methods in Security Engineering","author":"N. Zhang","year":"2004","unstructured":"Zhang, N., Ryan, M., Guelev, D.P.: Synthesising verified access control systems in XACML. In: 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, October 2004, pp. 56\u201365. ACM Press, New York (2004)"},{"key":"20_CR11","unstructured":"Qunoo, H., Ryan, M.: EC model in X-policy (December 2009), http:\/\/www.cs.bham.ac.uk\/~hxq\/X-policy\/"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:42:32Z","timestamp":1606167752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}