{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:48:58Z","timestamp":1725583738468},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207747"},{"type":"electronic","value":"9783642207754"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20775-4_1","type":"book-chapter","created":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T05:38:36Z","timestamp":1305956316000},"page":"1-29","source":"Crossref","is-referenced-by-count":6,"title":["Types for Role-Based Access Control of Dynamic Web Data"],"prefix":"10.1007","author":[{"given":"Mariangiola","family":"Dezani-Ciancaglini","sequence":"first","affiliation":[]},{"given":"Silvia","family":"Ghilezan","sequence":"additional","affiliation":[]},{"given":"Svetlana","family":"Jak\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Jovanka","family":"Pantovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"113","DOI":"10.3233\/JCS-2006-14202","volume":"14","author":"C. Braghin","year":"2006","unstructured":"Braghin, C., Gorla, D., Sassone, V.: Role-based access control for a distributed calculus. Journal of Computer Security\u00a014(2), 113\u2013155 (2006)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/963778.963781","volume":"26","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Castagna, G., Crafa, S.: Access control for mobile agents: The calculus of boxed ambients. ACM Transactions on Programming Languages and Systems\u00a026(1), 57\u2013124 (2004)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ic.2005.06.002","volume":"202","author":"M. Bugliesi","year":"2005","unstructured":"Bugliesi, M., Crafa, S., Merro, M., Sassone, V.: Communication and mobility control in boxed ambients. Information and Computation\u00a0202(1), 39\u201386 (2005)","journal-title":"Information and Computation"},{"issue":"2","key":"1_CR4","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/S0890-5401(01)93121-9","volume":"177","author":"L. Cardelli","year":"2002","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Types for the ambient calculus. Information and Computation\u00a0177(2), 160\u2013194 (2002)","journal-title":"Information and Computation"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ic.2004.11.005","volume":"201","author":"G. Castagna","year":"2005","unstructured":"Castagna, G., Vitek, J., Nardelli, F.Z.: The Seal calculus. Information and Computation\u00a0201(1), 1\u201354 (2005)","journal-title":"Information and Computation"},{"issue":"1-3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.tcs.2008.01.040","volume":"398","author":"A.B. Compagnoni","year":"2008","unstructured":"Compagnoni, A.B., Gunter, E.L., Bidinger, P.: Role-based access control for boxed ambients. Theoretical Computer Science\u00a0398(1-3), 203\u2013216 (2008)","journal-title":"Theoretical Computer Science"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1017\/S0960129508006658","volume":"18","author":"M. Coppo","year":"2008","unstructured":"Coppo, M., Dezani-Ciancaglini, M., Giovannetti, E.: Types for ambient and process mobility. Mathematical Structures in Computer Science\u00a018, 221\u2013290 (2008)","journal-title":"Mathematical Structures in Computer Science"},{"issue":"2-3","key":"1_CR8","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.tcs.2008.04.032","volume":"402","author":"M. Dezani-Ciancaglini","year":"2008","unstructured":"Dezani-Ciancaglini, M., Ghilezan, S., Pantovic, J., Varacca, D.: Security types for dynamic web data. Theoretical Computer Science\u00a0402(2-3), 156\u2013171 (2008)","journal-title":"Theoretical Computer Science"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"D.F. Ferraiolo","year":"1999","unstructured":"Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security\u00a02(1), 34\u201364 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"1_CR10","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Sandhu, R.S.: R\u00f4le-based access control. In: NIST-NSA National Computer Security Conference, pp. 554\u2013563 (1992)"},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.tcs.2005.06.006","volume":"342","author":"P. Gardner","year":"2005","unstructured":"Gardner, P., Maffeis, S.: Modelling dynamic web data. Theoretical Computer Science\u00a0342(1), 104\u2013131 (2005)","journal-title":"Theoretical Computer Science"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0960129507006226","volume":"17","author":"P. Garralda","year":"2007","unstructured":"Garralda, P., Bonelli, E., Compagnoni, A., Dezani-Ciancaglini, M.: Boxed ambients with communication interfaces. Mathematical Structures in Computer Science\u00a017, 1\u201359 (2007)","journal-title":"Mathematical Structures in Computer Science"},{"issue":"3:2","key":"1_CR14","first-page":"331","volume":"1","author":"D. Gorla","year":"2005","unstructured":"Gorla, D., Hennessy, M., Sassone, V.: Security policies as membranes in systems for global computing. Logical Methods in Computer Science\u00a01(3:2), 331\u2013353 (2005)","journal-title":"Logical Methods in Computer Science"},{"key":"1_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511611063","volume-title":"A Distributed Pi-calculus","author":"M. Hennessy","year":"2007","unstructured":"Hennessy, M.: A Distributed Pi-calculus. Cambridge University Press, Cambridge (2007)"},{"issue":"4-5","key":"1_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00236-005-0178-y","volume":"42","author":"M. Hennessy","year":"2005","unstructured":"Hennessy, M., Rathke, J., Yoshida, N.: SafeDpi: A language for controlling mobile code. Acta Informatica\u00a042(4-5), 227\u2013290 (2005)","journal-title":"Acta Informatica"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Information and Computation\u00a0173(1), 82\u2013120 (2002)","journal-title":"Information and Computation"},{"issue":"6","key":"1_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"D.R. Kuhn","year":"2010","unstructured":"Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer\u00a043(6), 79\u201381 (2010)","journal-title":"Computer"},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/596980.596981","volume":"25","author":"F. Levi","year":"2003","unstructured":"Levi, F., Sangiorgi, D.: Controlling interference in ambients. Transactions on Programming Languages and Systems\u00a025(1), 1\u201369 (2003)","journal-title":"Transactions on Programming Languages and Systems"},{"issue":"1","key":"1_CR20","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jlap.2007.06.004","volume":"75","author":"S. Maffeis","year":"2008","unstructured":"Maffeis, S., Gardner, P.: Behavioural equivalences for dynamic Web data. Journal of Logic and Algebraic Programming\u00a075(1), 86\u2013138 (2008)","journal-title":"Journal of Logic and Algebraic Programming"},{"issue":"2","key":"1_CR21","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/1119479.1119482","volume":"28","author":"M. Merro","year":"2006","unstructured":"Merro, M., Hennessy, M.: A bisimulation-based semantic theory of safe ambients. ACM Transactions on Programming Languages and Systems\u00a028(2), 290\u2013330 (2006)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"1_CR22","volume-title":"Communicating and Mobile Systems: the \u03c0-Calculus","author":"R. Milner","year":"1999","unstructured":"Milner, R.: Communicating and Mobile Systems: the \u03c0-Calculus. Cambridge University Press, Cambridge (1999)"},{"issue":"2","key":"1_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S. Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R.S., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security\u00a03(2), 85\u2013106 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"1_CR24","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Functional and Constraint Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20775-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T09:39:01Z","timestamp":1558604341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20775-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207747","9783642207754"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20775-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}