{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:44:41Z","timestamp":1725565481392},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642156397"},{"type":"electronic","value":"9783642156403"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15640-3_23","type":"book-chapter","created":{"date-parts":[[2010,9,15]],"date-time":"2010-09-15T04:11:29Z","timestamp":1284523889000},"page":"348-363","source":"Crossref","is-referenced-by-count":2,"title":["Probabilistic Aspects: Checking Security in an Imperfect World"],"prefix":"10.1007","author":[{"given":"Chris","family":"Hankin","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"23_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/S0004-3702(98)00032-0","volume":"102","author":"O. Arieli","year":"1998","unstructured":"Arieli, O., Avron, A.: The value of the four values. Artif. Intell.\u00a0102(1), 97\u2013141 (1998)","journal-title":"Artif. Intell."},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-40042-4_4","volume-title":"Global Computing. Programming Environments, Languages, Security, and Analysis of Systems","author":"L. Bettini","year":"2003","unstructured":"Bettini, L., Bono, V., De Nicola, R., Ferrari, G., Gorla, D., Loreti, M., Moggi, E., Pugliese, R., Tuosto, E., Venneri, B.: The Klaim Project: Theory and Practice. In: Priami, C. (ed.) GC 2003. LNCS, vol.\u00a02874, pp. 88\u2013150. Springer, Heidelberg (2003)"},{"key":"23_CR3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1314436.1314439","volume-title":"Proceedings of the ACM workshop on Formal methods in security engineering","author":"G. Bruns","year":"2007","unstructured":"Bruns, G., Dantas, D.S., Huth, M.: A simple and expressive semantic framework for policy composition in access control. In: Proceedings of the ACM workshop on Formal methods in security engineering, pp. 12\u201321. ACM Press, New York (2007)"},{"key":"23_CR4","first-page":"163","volume-title":"Proceedings of the 21st IEEE Computer Security Foundations Symposium","author":"G. Bruns","year":"2008","unstructured":"Bruns, G., Huth, M.: Access-control policies via Belnap logic: Effective and efficient composition and analysis. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, pp. 163\u2013176. IEEE, Los Alamitos (2008)"},{"unstructured":"De Nicola, R., Katoen, J.-P., Latella, D., Massink, M.: StoKlaim: A Stochastic Extension of Klaim. Technical Report 2006-TR-01, Universit\u00e0 degli Studi di Firenze (2006)","key":"23_CR5"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/3-540-53479-2_17","volume-title":"Semantics of Systems of Concurrent Processes","author":"R. Nicola De","year":"1990","unstructured":"De Nicola, R., Vaandrager, F.W.: Action versus state based logics for transition systems. In: Guessarian, I. (ed.) LITP 1990. LNCS, vol.\u00a0469, pp. 407\u2013419. Springer, Heidelberg (1990)"},{"key":"23_CR7","first-page":"117","volume-title":"8th International Conference on Engineering of Complex Computer Systems","author":"G. Georg","year":"2002","unstructured":"Georg, G., Ray, I., France, R.: Using aspects to design a secure system. In: 8th International Conference on Engineering of Complex Computer Systems, pp. 117\u2013126. IEEE Computer Society, Los Alamitos (2002)"},{"key":"23_CR8","first-page":"234","volume-title":"Proceedings of the 22nd IEEE Computer Security Foundations Symposium","author":"C. Hankin","year":"2009","unstructured":"Hankin, C., Nielson, F., Riis Nielson, H.: Advice from Belnap policies. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, pp. 234\u2013247. IEEE, Los Alamitos (2009)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-68265-3_10","volume-title":"Coordination Models and Languages","author":"C. Hankin","year":"2008","unstructured":"Hankin, C., Nielson, F., Riis Nielson, H., Yang, F.: Advice for coordination. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol.\u00a05052, pp. 153\u2013168. Springer, Heidelberg (2008)"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-24634-3_11","volume-title":"Coordination Models and Languages","author":"A. Pierro Di","year":"2004","unstructured":"Di Pierro, A., Hankin, C., Wiklicky, H.: Probabilistic Klaim. In: De Nicola, R., Ferrari, G.-L., Meredith, G. (eds.) COORDINATION 2004. LNCS, vol.\u00a02949, pp. 119\u2013134. Springer, Heidelberg (2004)"},{"key":"23_CR11","first-page":"633","volume-title":"Aspect-Oriented Software Development","author":"B. Win De","year":"2005","unstructured":"De Win, B., Joosen, W., Piessens, F.: Developing secure applications through aspect-oriented programming. In: Aspect-Oriented Software Development, pp. 633\u2013650. Addison-Wesley, Reading (2005)"}],"container-title":["Lecture Notes in Computer Science","Trustworthly Global Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15640-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T23:26:42Z","timestamp":1636500402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15640-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642156397","9783642156403"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15640-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}