{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T19:45:29Z","timestamp":1760298329179,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642191244"},{"type":"electronic","value":"9783642191251"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19125-1_6","type":"book-chapter","created":{"date-parts":[[2011,1,24]],"date-time":"2011-01-24T05:55:45Z","timestamp":1295848545000},"page":"73-86","source":"Crossref","is-referenced-by-count":25,"title":["Predictability of Enforcement"],"prefix":"10.1007","author":[{"given":"Nataliia","family":"Bielova","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"General topology I : basic concepts and constructions, dimension theory","year":"1990","key":"6_CR1","unstructured":"Pontryagin, L.S., Arkhangel\u2019skii, A.V. (eds.): General topology I: basic concepts and constructions, dimension theory. Springer, Heidelberg (1990)"},{"issue":"1-2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"L. Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. Int. J. of Inform. Sec.\u00a04(1-2), 2\u201316 (2005)","journal-title":"Int. J. of Inform. Sec."},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-04766-4_17","volume-title":"Identity and Privacy in the Internet Age","author":"N. Bielova","year":"2009","unstructured":"Bielova, N., Massacci, F., Micheletti, A.: Towards practical enforcement theories. In: J\u00f8sang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol.\u00a05838, pp. 239\u2013254. Springer, Heidelberg (2009)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-540-79104-1_17","volume-title":"Information Security Practice and Experience","author":"A. Brown","year":"2008","unstructured":"Brown, A., Ryan, M.: Synthesising monitors from high-level policies for the safe execution of untrusted software. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 233\u2013247. Springer, Heidelberg (2008)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Chatterjee, K., Doyen, L., Henzinger, T.A.: Expressiveness and closure properties for quantitative languages. Comp. Research Repository, abs\/1007.4018 (2010)","DOI":"10.2168\/LMCS-6(3:10)2010"},{"key":"6_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-0399-0","volume-title":"Measure Theory","author":"D.L. Cohn","year":"1980","unstructured":"Cohn, D.L.: Measure Theory. Birkhauser, Basel (1980)"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.istr.2008.02.001","volume":"13","author":"L. Desmet","year":"2008","unstructured":"Desmet, L., Joosen, W., Massacci, F., Philippaerts, P., Piessens, F., Siahaan, I., Vanoverberghe, D.: Security-by-contract on the .net platform. Information Security Technical Report\u00a013(1), 25\u201332 (2008)","journal-title":"Information Security Technical Report"},{"key":"6_CR8","unstructured":"Erlingsson, U.: The Inlined Reference Monitor Approach to Security Policy Enforcement. PhD thesis, Cornell University (2003)"},{"key":"6_CR9","first-page":"593","volume-title":"Proc. of 24th ACM Symp. on Applied Computing \u2013 Software Verif. and Test. Track","author":"Y. Falcone","year":"2009","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: Enforcement monitoring wrt. the safety-progress classification of properties. In: Proc. of 24th ACM Symp. on Applied Computing \u2013 Software Verif. and Test. Track, pp. 593\u2013600. ACM Press, New York (2009)"},{"key":"6_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-13446-3_5","volume-title":"Trust Management IV","author":"G. Gheorghe","year":"2010","unstructured":"Gheorghe, G., Neuhaus, S., Crispo, B.: xESB: An enterprise service bus for access and usage control policy enforcement. In: IFIPTM 2010. IFIP Advances in Information and Communication Technology, vol.\u00a0321, pp. 63\u201378. Springer, Heidelberg (2010)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-14706-7_11","volume-title":"Computer Network Security","author":"R. Khoury","year":"2010","unstructured":"Khoury, R., Tawbi, N.: Using Equivalence Relations for Corrective Enforcement of Security Policies. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol.\u00a06258, pp. 139\u2013154. Springer, Heidelberg (2010)"},{"issue":"8","key":"6_CR12","first-page":"707","volume":"10","author":"V.I. Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady\u00a010(8), 707\u2013710 (1966); An English translation of the \u201cPhysics Sections\u201d of the Proceedings of the Academy of Sciences of the USSR","journal-title":"Soviet Physics Doklady"},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J. Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. on Inform. and Sys. Security\u00a012(3), 1\u201341 (2009)","journal-title":"ACM Trans. on Inform. and Sys. Security"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-15497-3_6","volume-title":"Computer Security \u2013 ESORICS 2010","author":"J. Ligatti","year":"2010","unstructured":"Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 87\u2013100. Springer, Heidelberg (2010)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Matthews, S.G.: Partial metric topology. In: Proceedings of the 8th Summer Conference, Queen\u2019s College, vol.\u00a0728, pp. 183\u2013197. Annals of the New York Academy of Sciences (1994)","DOI":"10.1111\/j.1749-6632.1994.tb44144.x"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Trans. on Inform. and Sys. Security\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Trans. on Inform. and Sys. Security"},{"key":"6_CR17","first-page":"47","volume-title":"Proc. of ACM Symp. on Inform., Comp. and Comm. Security","author":"P.H. Phung","year":"2009","unstructured":"Phung, P.H., Sands, D., Chudnov, A.: Lightweight self-protecting javascript. In: Proc. of ACM Symp. on Inform., Comp. and Comm. Security, pp. 47\u201360. ACM Press, New York (2009)"},{"key":"6_CR18","first-page":"240","volume-title":"Proc. of ACM Symp. on Inform. Comp. and Comm. Security","author":"A. Pretschner","year":"2008","unstructured":"Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for usage control. In: Proc. of ACM Symp. on Inform. Comp. and Comm. Security, pp. 240\u2013244. ACM Press, New York (2008)"},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. on Inform. and Sys. Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Trans. on Inform. and Sys. Security"},{"issue":"2-4","key":"6_CR20","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ic.2007.07.009","volume":"206","author":"C. Talhi","year":"2007","unstructured":"Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inform. and Comp.\u00a0206(2-4), 158\u2013184 (2007)","journal-title":"Inform. and Comp."},{"key":"6_CR21","first-page":"237","volume-title":"Proc. of the 34th ACM SIGPLAN-SIGACT Symp. on Princ. of Prog. Lang.","author":"D. Yun","year":"2007","unstructured":"Yun, D., Chander, A., Islam, N., Serikov, I.: Javascript instrumentation for browser security. In: Proc. of the 34th ACM SIGPLAN-SIGACT Symp. on Princ. of Prog. Lang., pp. 237\u2013249. ACM Press, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19125-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T22:59:12Z","timestamp":1559948352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19125-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642191244","9783642191251"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19125-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}