{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:38:27Z","timestamp":1743064707652,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214639"},{"type":"electronic","value":"9783642214646"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21464-6_14","type":"book-chapter","created":{"date-parts":[[2011,6,7]],"date-time":"2011-06-07T02:55:55Z","timestamp":1307415355000},"page":"202-218","source":"Crossref","is-referenced-by-count":4,"title":["Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces"],"prefix":"10.1007","author":[{"given":"Fan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Tomoyuki","family":"Aotani","sequence":"additional","affiliation":[]},{"given":"Hidehiko","family":"Masuhara","sequence":"additional","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"364","volume-title":"OOPSLA 2005","author":"C. Allan","year":"2005","unstructured":"Allan, C., Avgustinov, P., Christensen, A., Hendren, L., Kuzins, S., Lhot\u00e1k, O., de Moor, O., Sereni, D., Sittampalam, G., Tibble, J.: Adding trace matching with free variables to AspectJ. In: OOPSLA 2005, p. 364. ACM, New York (2005)"},{"key":"14_CR2","first-page":"161","volume-title":"AOSD 2007","author":"T. Aotani","year":"2007","unstructured":"Aotani, T., Masuhara, H.: SCoPE: an AspectJ compiler for supporting user-defined analysis-based pointcuts. In: AOSD 2007, pp. 161\u2013172. ACM, New York (2007)"},{"key":"14_CR3","first-page":"305","volume-title":"PLDI 2005","author":"L. Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Composing security policies with Polymer. In: PLDI 2005, pp. 305\u2013314. ACM, New York (2005)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/3-540-36520-6_16","volume-title":"Scientific Engineering for Distributed Java Applications","author":"L. Bettini","year":"2003","unstructured":"Bettini, L., De Nicola, R.: A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces. In: Guelfi, N., Astesiano, E., Reggio, G. (eds.) FIDJI 2002. LNCS, vol.\u00a02604, pp. 175\u2013184. Springer, Heidelberg (2003)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/11419822_2","volume-title":"Formal Methods for Mobile Computing","author":"L. Bettini","year":"2005","unstructured":"Bettini, L., De Nicola, R.: Mobile Distributed Programming in X-Klaim. In: Bernardo, M., Bogliolo, A. (eds.) SFM-Moby 2005. LNCS, vol.\u00a03465, pp. 29\u201368. Springer, Heidelberg (2005)"},{"issue":"14","key":"14_CR6","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1002\/spe.486","volume":"32","author":"L. Bettini","year":"2002","unstructured":"Bettini, L., De Nicola, R., Pugliese, R.: Klava: a Java package for distributed and mobile applications. Software-Practice and Experience\u00a032(14), 1365\u20131394 (2002)","journal-title":"Software-Practice and Experience"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Bodden, E., Havelund, K.: Aspect-oriented Race Detection in Java. IEEE Transactions on Software Engineering (2010)","DOI":"10.1109\/TSE.2010.25"},{"key":"14_CR8","unstructured":"Bruneton, E., Lenglet, R., Coupaye, T.: ASM: a code manipulation tool to implement adaptable systems. In: Proceedings of the ASF (ACM SIGOPS France) Journees Composants 2002: Adaptable and Extensible Component Systems (2002)"},{"key":"14_CR9","unstructured":"Canadian Institutes of Health Research. Secondary Use of Personal Information in Health Research: Case Studies. Public Works and Government Services Canada (2002)"},{"key":"14_CR10","first-page":"255","volume-title":"AOSD 2009","author":"B. Cannon","year":"2009","unstructured":"Cannon, B., Wohlstadter, E.: Enforcing security for desktop clients using authority aspects. In: AOSD 2009, pp. 255\u2013266. ACM, New York (2009)"},{"key":"14_CR11","first-page":"102","volume-title":"AOSD 2004","author":"S. Chiba","year":"2004","unstructured":"Chiba, S., Nakagawa, K.: Josh: an open AspectJ-like language. In: AOSD 2004, pp. 102\u2013111. ACM, New York (2004)"},{"issue":"5","key":"14_CR12","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R. De Nicola","year":"1998","unstructured":"De Nicola, R., Ferrari, G.L., Pugliese, R.: KLAIM: A kernel language for agents interaction and mobility. IEEE Transactions on Software Engineering\u00a024(5), 315\u2013330 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"14_CR13","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0304-3975(99)00232-7","volume":"240","author":"R. Nicola De","year":"2000","unstructured":"De Nicola, R., Ferrari, G.L., Pugliese, R., Venneri, B.: Types for access control. Theoretical Computer Science\u00a0240(1), 215\u2013254 (2000)","journal-title":"Theoretical Computer Science"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-68265-3_7","volume-title":"Coordination Models and Languages","author":"R. Nicola De","year":"2008","unstructured":"De Nicola, R., Gorla, D., Hansen, R.R., Nielson, F., Riis Nielson, H., Probst, C.W., Pugliese, R.: From flow logic to static type systems for coordination languages. In: Wang, A.H., Tennenholtz, M. (eds.) COORDINATION 2008. LNCS, vol.\u00a05052, pp. 100\u2013116. Springer, Heidelberg (2008)"},{"key":"14_CR15","first-page":"71","volume-title":"FMSE 2007","author":"A.S. Oliveira de","year":"2007","unstructured":"de Oliveira, A.S., Wang, E.K., Kirchner, C., Kirchner, H.: Weaving rewrite-based access control policies. In: FMSE 2007, pp. 71\u201380. ACM, New York (2007)"},{"key":"14_CR16","unstructured":"Department of Health, UK. NHS Code of Practice-Confidentiality (2003)"},{"key":"14_CR17","unstructured":"Evered, M., B\u00f6geholz, S.: A case study in access control requirements for a health information system. In: ACSW Frontiers 2004, pp. 53\u201361. Australian Computer Society, Inc. (2004)"},{"key":"14_CR18","volume-title":"JavaSpaces principles, patterns, and practice","author":"E. Freeman","year":"1999","unstructured":"Freeman, E., Arnold, K., Hupfer, S.: JavaSpaces principles, patterns, and practice. Addison-Wesley, Reading (1999)"},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D. Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative communication in Linda. ACM Trans. Program. Lang. Syst.\u00a07(1), 80\u2013112 (1985)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"4","key":"14_CR20","first-page":"479","volume":"73","author":"R. Gorrieri","year":"2006","unstructured":"Gorrieri, R., Lucchi, R., Zavattaro, G.: Supporting secure coordination in SecSpaces. Fundamenta Informaticae\u00a073(4), 479\u2013506 (2006)","journal-title":"Fundamenta Informaticae"},{"issue":"3","key":"14_CR21","first-page":"122","volume":"85","author":"R. Handorean","year":"2003","unstructured":"Handorean, R., Roman, G.: Secure sharing of tuple spaces in ad hoc settings. ENTCS\u00a085(3), 122\u2013141 (2003)","journal-title":"ENTCS"},{"key":"14_CR22","unstructured":"Kiczales, G.: The fun has just begun. Keynote AOSD (2003)"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"G. Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of aspectJ. In: Lee, S.H. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 327\u2013353. Springer, Heidelberg (2001)"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C.V., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Liu, Y., Auletta, V. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"14_CR25","unstructured":"Kniesel, G., Rho, T., Hanenberg, S.: Evolvable pattern implementations need generic aspects. In: RAM-SE 2004, pp. 111\u2013126. Universit\u00e4t Magdeburg (2004)"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-540-40018-9_8","volume-title":"Programming Languages and Systems","author":"K.A. Hansen","year":"2003","unstructured":"Hansen, K.A., Kawauchi, K.: Dataflow pointcut in aspect-oriented programming. In: Ohori, A. (ed.) APLAS 2003. LNCS, vol.\u00a02895, pp. 105\u2013121. Springer, Heidelberg (2003)"},{"key":"14_CR27","first-page":"51","volume-title":"AOSD 2006","author":"L.D.B. Navarro","year":"2006","unstructured":"Navarro, L.D.B., S\u00fcdholt, M., Vanderperren, W., Fraine, B.D., Suv\u00e9e, D.: Explicitly distributed AOP using AWED. In: AOSD 2006, pp. 51\u201362. ACM, New York (2006)"},{"key":"14_CR28","first-page":"7","volume-title":"AOSD 2004","author":"M. Nishizawa","year":"2004","unstructured":"Nishizawa, M., Chiba, S., Tatsubori, M.: Remote pointcut: a language construct for distributed AOP. In: AOSD 2004, pp. 7\u201315. ACM, New York (2004)"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/11531142_10","volume-title":"ECOOP 2005 - Object-Oriented Programming","author":"K. Ostermann","year":"2005","unstructured":"Ostermann, K., Mezini, M., Bockisch, C.: Expressive pointcuts for increased modularity. In: Gao, X.-X. (ed.) ECOOP 2005. LNCS, vol.\u00a03586, pp. 214\u2013240. Springer, Heidelberg (2005)"},{"key":"14_CR30","first-page":"35","volume-title":"GPCE 2009","author":"H. Sadat-Mohtasham","year":"2009","unstructured":"Sadat-Mohtasham, H., Hoover, H.: Transactional pointcuts: designation reification and advice of interrelated join points. In: GPCE 2009, pp. 35\u201344. ACM, New York (2009)"},{"key":"14_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/11561347_13","volume-title":"Generative Programming and Component Engineering","author":"\u00c9. Tanter","year":"2005","unstructured":"Tanter, \u00c9., Noy\u00e9, J.: A versatile kernel for multi-language AOP. In: Gl\u00fcck, R., Lowry, M. (eds.) GPCE 2005. LNCS, vol.\u00a03676, pp. 173\u2013188. Springer, Heidelberg (2005)"},{"issue":"1-2","key":"14_CR32","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0167-6423(02)00090-4","volume":"46","author":"J. Vitek","year":"2003","unstructured":"Vitek, J., Bryce, C., Oriol, M.: Coordinating processes with secure spaces. Science of Computer Programming\u00a046(1-2), 163\u2013193 (2003)","journal-title":"Science of Computer Programming"},{"key":"14_CR33","first-page":"633","volume-title":"Aspect-Oriented Software Development","author":"B.D. Win","year":"2002","unstructured":"Win, B.D., Joosen, W., Piessens, F.: Developing secure applications through aspect-oriented programming. In: Aspect-Oriented Software Development, pp. 633\u2013650. Addison-Wesley, Reading (2002)"},{"key":"14_CR34","unstructured":"Yang, F.: Aspects with program analysis for security policies. Phd Dissertation, Technical University of Denmark (2010)"},{"key":"14_CR35","unstructured":"Yang, F., Hankin, C., Nielson, F., Nielson, H.R.: Aspect-oriented access control of tuple spaces (submitted to a journal)"}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21464-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T04:22:47Z","timestamp":1553746967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21464-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214639","9783642214646"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21464-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}