{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T19:10:00Z","timestamp":1740424200981,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_12","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"155-168","source":"Crossref","is-referenced-by-count":0,"title":["Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus"],"prefix":"10.1007","author":[{"given":"Devrim","family":"Unal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ozan","family":"Akar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Ufuk Caglayan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/CSF.2007.18","volume-title":"20th IEEE Computer Security Foundations Symposium","author":"M. Becker","year":"2007","unstructured":"Becker, M., Fournet, C., Gordon, A.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium, pp. 3\u201315. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/CSFW.1999.779772","volume-title":"12th IEEE Computer Security Foundations Workshop","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Buccafurri, F.: A logical framework for reasoning on data access control policies. In: 12th IEEE Computer Security Foundations Workshop, pp. 175\u2013189. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Cardelli, L., Gordon, A.D.: Anytime, anywhere: modal logics for mobile ambients. In: 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2000, pp. 365\u2013377 (2000)","DOI":"10.1145\/325694.325742"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0304-3975(99)00231-5","volume":"240","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Gordon, A.D.: Mobile ambients. Theoretical Computer Science\u00a0240(1), 177\u2013213 (2000)","journal-title":"Theoretical Computer Science"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/3-540-45927-8_21","volume-title":"Programming Languages and Systems","author":"W. Charatonik","year":"2002","unstructured":"Charatonik, W., Gordon, A., Talbot, J.: Finite-control mobile ambients. In: Le M\u00e9tayer, D. (ed.) ESOP 2002. LNCS, vol.\u00a02305, pp. 295\u2013313. Springer, Heidelberg (2002)"},{"issue":"1-3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0304-3975(02)00832-0","volume":"308","author":"W. Charatonik","year":"2003","unstructured":"Charatonik, W., Zilio, S.D., Gordon, A.D., Mukhopadhyay, S., Talbot, J.: Model checking mobile ambients. Theoretical Computer Science\u00a0308(1-3), 277\u2013331 (2003)","journal-title":"Theoretical Computer Science"},{"issue":"1-3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.tcs.2008.01.040","volume":"398","author":"A. Compagnoni","year":"2008","unstructured":"Compagnoni, A., Bidinger, P.: Role-based access control for boxed ambients. Theoretical Computer Science\u00a0398(1-3), 203\u2013216 (2008)","journal-title":"Theoretical Computer Science"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/CSFW.1996.503697","volume-title":"9th IEEE Computer Security Foundations Workshop","author":"F. Cuppens","year":"1996","unstructured":"Cuppens, F., Saurel, C.: Specifying a security policy: a case study. In: 9th IEEE Computer Security Foundations Workshop, pp. 123\u2013134. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Drouineaud, M., Bortin, M., Torrini, P., Sohr, K.: A first step towards formal verification of security policy properties for RBAC. In: Proc. QSIC (2004)","DOI":"10.1109\/QSIC.2004.1357945"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"12_CR12","first-page":"410","volume":"4","author":"C.C. Giunchiglia","year":"2000","unstructured":"Giunchiglia, C.C., Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: Nusmv: a new symbolic model checker. International Journal on Software Tools for Technology Transfer\u00a04, 410\u2013425 (2000)","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: IEEE Symposium on Security and Privacy, pp. 31\u201342 (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"issue":"2","key":"12_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst.\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Trans. Database Syst."},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Mardare, R., Priami, C., Quaglia, P., Vagin, O.: Model checking biological systems described using ambient calculus. Computational Methods in Systems Biology, 85\u2013103 (2005)","DOI":"10.1007\/978-3-540-25974-9_8"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Neuman, C.: Representation and evaluation of security policies for distributed system services. In: DARPA Information Survivability Conference and Exposition, pp. 172\u2013183 (2000)","DOI":"10.1109\/DISCEX.2000.821518"},{"key":"12_CR17","unstructured":"Scott, D.: Abstracting application-level security policy for ubiquitous computing. Ph.D. thesis, University of Cambridge (2005)"},{"issue":"7","key":"12_CR18","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TKDE.2008.28","volume":"20","author":"K. Sohr","year":"2008","unstructured":"Sohr, K., Drouineaud, M., Ahn, G., Gogolla, M.: Analyzing and managing Role-Based access control policies. IEEE Transactions on Knowledge and Data Engineering\u00a020(7), 924\u2013939 (2008)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Unal, D., Caglayan, M.U.: Theorem proving for modeling and conflict checking of authorization policies. In: Proc. ISCN (2006)","DOI":"10.1109\/ISCN.2006.1662524"},{"key":"12_CR20","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","volume":"2","author":"T.Y.C. Woo","year":"1993","unstructured":"Woo, T.Y.C., Lam, S.S.: Authorizations in distributed systems: A new approach. Journal of Computer Security\u00a02, 107\u2013136 (1993)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"12_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JCS-2008-16101","volume":"16","author":"N. Zhang","year":"2007","unstructured":"Zhang, N., Guelev, D., Ryan, M.: Synthesising verified access control systems through model checking. Journal of Computer Security\u00a016(1), 1\u201361 (2007)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T03:00:09Z","timestamp":1740366009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}