{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:00:15Z","timestamp":1743130815154,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642177453"},{"type":"electronic","value":"9783642177460"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17746-0_46","type":"book-chapter","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T04:05:44Z","timestamp":1291781144000},"page":"730-746","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Self-Policing Policy Language"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Speiser","sequence":"first","affiliation":[]},{"given":"Rudi","family":"Studer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","first-page":"437","volume-title":"Proc. Fifth Princeton Symposium on Information Sciences and Systems","author":"B.W. Lampson","year":"1971","unstructured":"Lampson, B.W.: Protection. In: Proc. Fifth Princeton Symposium on Information Sciences and Systems, pp. 437\u2013443. Princeton University, Princeton (March 1971); reprinted in Operating Systems Review 8 (1), 18 \u2013 24 (January 1974)"},{"key":"46_CR2","unstructured":"Dodds, L.: Rights Statements on the Web of Data. Nodalities Magazine\u00a0(9) (2010), \n                      http:\/\/www.talis.com\/nodalities\/pdf\/nodalities_issue9.pdf"},{"key":"46_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/978-3-642-04930-9_35","volume-title":"The Semantic Web - ISWC 2009","author":"O. Seneviratne","year":"2009","unstructured":"Seneviratne, O., Kagal, L., Berners-Lee, T.: Policy Aware Content Reuse on the Web. In: Bernstein, A., Karger, D.R., Heath, T., Feigenbaum, L., Maynard, D., Motta, E., Thirunarayan, K. (eds.) ISWC 2009. LNCS, vol.\u00a05823, pp. 553\u2013568. Springer, Heidelberg (2009)"},{"key":"46_CR4","unstructured":"W3C: RDF Vocabulary Description Language 1.0: RDF Schema. W3C Recommendation (2004), \n                      http:\/\/www.w3.org\/TR\/rdf-schema\/"},{"key":"46_CR5","volume-title":"Principles of Database and Knowledge-Base Systems","author":"J.D. Ullman","year":"1989","unstructured":"Ullman, J.D.: Principles of Database and Knowledge-Base Systems, vol.\u00a0II. Computer Science Press, Rockville (1989)"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., Walsh, W.E.: An Artificial Intelligence Perspective on Autonomic Computing Policies. In: IEEE Workshop on Policies for Distributed Systems and Networks, POLICY (2004)","DOI":"10.1109\/POLICY.2004.1309145"},{"key":"46_CR7","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russel","year":"2003","unstructured":"Russel, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 2nd edn. Prentice Hall, Englewood Cliffs (2003)","edition":"2"},{"key":"46_CR8","unstructured":"W3C: RIF Core Dialect. W3C Recommendation (2010), \n                      http:\/\/www.w3.org\/TR\/rif-core\/"},{"key":"46_CR9","unstructured":"W3C: RIF RDF and OWL Compatibility. W3C Recommendation (2010), \n                      http:\/\/www.w3.org\/TR\/rif-rdf-owl\/"},{"key":"46_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11762256_26","volume-title":"The Semantic Web: Research and Applications","author":"A. Polleres","year":"2006","unstructured":"Polleres, A., Feier, C., Harth, A.: Rules with Contextually Scoped Negation. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol.\u00a04011, pp. 332\u2013347. Springer, Heidelberg (2006)"},{"key":"46_CR11","unstructured":"Abelson, H., Adida, B., Linksvayer, M., Yergler, N.: ccREL: The Creative Commons Rights Expression Language. W3C Submission (2008)"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Kagal, L., Hanson, C., Weitzner, D.: Using Dependency Tracking to Provide Explanations for Policy Management. In: IEEE Workshop on Policies for Distributed Systems and Networks, POLICY (2008)","DOI":"10.1109\/POLICY.2008.51"},{"key":"46_CR13","unstructured":"W3C: RIF Basic Logic Dialect. W3C Recommendation (2010), \n                      http:\/\/www.w3.org\/TR\/rif-bld\/"},{"issue":"3","key":"46_CR14","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/382780.382783","volume":"48","author":"G. Gottlob","year":"2001","unstructured":"Gottlob, G., Leone, N., Scarcello, F.: The complexity of acyclic conjunctive queries. Journal of the ACM\u00a048(3), 431\u2013498 (2001)","journal-title":"Journal of the ACM"},{"issue":"4","key":"46_CR15","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1145\/319758.319775","volume":"7","author":"N. Goodman","year":"1982","unstructured":"Goodman, N., Shmueli, O.: Tree queries: a simple class of relational queries. ACM Trans. Database Syst.\u00a07(4), 653\u2013677 (1982)","journal-title":"ACM Trans. Database Syst."},{"key":"46_CR16","doi-asserted-by":"crossref","unstructured":"Chandra, A.K., Merlin, P.M.: Optimal implementation of conjunctive queries in relational data bases. In: Annual ACM Symposium on Theory of Computing (1977)","DOI":"10.1145\/800105.803397"},{"key":"46_CR17","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard (2005), \n                      http:\/\/docs.oasis-open.org\/xacml\/2.0\/"},{"key":"46_CR18","unstructured":"W3C: Web Services Policy 1.5 - Framework. W3C Recommendation (2007), \n                      http:\/\/www.w3.org\/TR\/ws-policy\/"},{"key":"46_CR19","unstructured":"Verma, K., Akkiraju, R., Goodwin, R.: Semantic matching of web service policies. In: Semantic and Dynamic Web Processes (SDWP) In Conjunction with the Third International Conference on Web Services, ICWS 2005 (2005)"},{"key":"46_CR20","unstructured":"Kolovski, V., Parsia, B.: WS-Policy and Beyond: Application of OWL Defaults to Web Service Policies. In: Semantic Web Policy Workshop (SWPW) at 5th International Semantic Web Conference, ISWC (2006)"},{"key":"46_CR21","unstructured":"Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement. In: IEEE Workshop on Policies for Distributed Systems and Networks, POLICY (2003)"},{"key":"46_CR22","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., De Coi, J.L., Olmedilla, D., Sauro, L.: A Rule-based Trust Negotiation System. IEEE Transactions on Knowledge and Data Engineering (2010)","DOI":"10.1109\/TKDE.2010.83"},{"key":"46_CR23","unstructured":"Bonatti, P.A., Olmedilla, D., Peer, J.: Advanced Policy Explanations on the Web. In: European Conference on Artificial Intelligence, ECAI (2006)"},{"key":"46_CR24","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Mogavero, F.: Comparing Rule-Based Policies. In: IEEE Workshop on Policies for Distributed Systems and Networks, POLICY (2008)","DOI":"10.1109\/POLICY.2008.16"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web \u2013 ISWC 2010"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17746-0_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T01:08:30Z","timestamp":1662772110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-17746-0_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642177453","9783642177460"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17746-0_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}