{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T04:33:41Z","timestamp":1742358821773,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_12","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"148-163","source":"Crossref","is-referenced-by-count":4,"title":["Formal Specification and Validation of Security Policies"],"prefix":"10.1007","author":[{"given":"Tony","family":"Bourdier","sequence":"first","affiliation":[]},{"given":"Horatiu","family":"Cirstea","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"Jaume","sequence":"additional","affiliation":[]},{"given":"H\u00e9l\u00e8ne","family":"Kirchner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-46767-X_12","volume-title":"Logic Programming and Nonmonotonic Reasoning","author":"J.J. Alferes","year":"1999","unstructured":"Alferes, J.J., Pereira, L.M., Przymusinska, H., Przymusinski, T.C.: LUPS - A Language for Updating Logic Programs. In: Gelfond, M., Leone, N., Pfeifer, G. (eds.) LPNMR 1999. LNCS (LNAI), vol.\u00a01730, pp. 162\u2013176. Springer, Heidelberg (1999)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press (1998)","DOI":"10.1017\/CBO9781139172752"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-73449-9_5","volume-title":"Term Rewriting and Applications","author":"E. Balland","year":"2007","unstructured":"Balland, E., Brauner, P., Kopetz, R., Moreau, P.E., Reilles, A.: Tom: Piggybacking Rewriting on Java. In: Baader, F. (ed.) RTA 2007. LNCS, vol.\u00a04533, pp. 36\u201347. Springer, Heidelberg (2007)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45619-8_5","volume-title":"Logic Programming","author":"S. Barker","year":"2002","unstructured":"Barker, S.: Access Control for Deductive Databases by Logic Programming. In: Stuckey, P.J. (ed.) ICLP 2002. LNCS, vol.\u00a02401, pp. 54\u201369. Springer, Heidelberg (2002)"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2003","unstructured":"Barker, S., Stuckey, P.J.: Flexible access control policy specification with constraint logic programming. ACM Transactions on Information and System Security\u00a06(4), 501\u2013546 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-74835-9_14","volume-title":"Computer Security \u2013 ESORICS 2007","author":"M.Y. Becker","year":"2007","unstructured":"Becker, M.Y., Nanz, S.: A Logic for State-Modifying Authorization Policies. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 203\u2013218. Springer, Heidelberg (2007)"},{"key":"12_CR7","unstructured":"Bell, D., LaPadula, L.: Secure Computer Systems: a Mathematical Model. Tech. Rep. MTR-2547 (Vol. II), MITRE Corp., Bedford, MA (May 1973)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., et al.: A logical framework for reasoning about access control model. ACM Transactions on Information and System Security\u00a06, 71\u2013127 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"5","key":"12_CR9","first-page":"357","volume":"6","author":"T. Bourdier","year":"2011","unstructured":"Bourdier, T.: Specification, analysis and transformation of security policies via rewriting techniques. Journal of Information Assurance and Security\u00a06(5), 357\u2013368 (2011)","journal-title":"Journal of Information Assurance and Security"},{"key":"12_CR10","unstructured":"Bourdier, T., Cirstea, H.: Constrained rewriting in recognizable theories. Tech. rep., INRIA (2010), http:\/\/hal.archives-ouvertes.fr\/inria-00456848\/en\/"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Chander, A., Mitchell, J., Dean, D.: A state-transition model of trust management and access control. In: Proceedings of the 14th IEEE Computer Security Foundation Workshop CSFW, pp. 27\u201343. IEEE Comp. Society Press (2001)","DOI":"10.1109\/CSFW.2001.930134"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"All About Maude - A High-Performance Logical Framework","author":"M. Clavel","year":"2007","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Talcott, C.: All About Maude - A High-Performance Logical Framework. LNCS, vol.\u00a04350. Springer, Heidelberg (2007)"},{"key":"12_CR13","unstructured":"Codd, E.F.: Relational completeness of data base sublanguages. In: Rustin, R. (ed.) Database Systems, pp. 65\u201398. Prentice Hall (1972)"},{"key":"12_CR14","unstructured":"Damianou, N., et al.: A survey of policy specification approaches. Tech. rep., Department of Computing, Imperial College of Science Technology and Medicine, London, UK (2002), http:\/\/www.doc.ic.ac.uk\/~mss\/Papers\/PolicySurvey.pdf"},{"key":"12_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1007\/11814771_51","volume-title":"Automated Reasoning","author":"D.J. Dougherty","year":"2006","unstructured":"Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Specifying and Reasoning About Dynamic Access-Control Policies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), vol.\u00a04130, pp. 632\u2013646. Springer, Heidelberg (2006)"},{"key":"12_CR16","first-page":"193","volume":"2","author":"M. Gelfond","year":"1998","unstructured":"Gelfond, M., Lifschitz, V.: Action languages. Electron. Trans. Artif. Intell.\u00a02, 193\u2013210 (1998)","journal-title":"Electron. Trans. Artif. Intell."},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04342-0_22","volume-title":"Recent Advances in Intrusion Detection, 12th International Symposium, RAID","author":"L. George","year":"2009","unstructured":"George, L., T\u01d2ng, V.V.T., M\u00e9, L.: Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol.\u00a05758, pp. 355\u2013356. Springer, Heidelberg (2009)"},{"issue":"4","key":"12_CR18","first-page":"372","volume":"4","author":"L. Habib","year":"2009","unstructured":"Habib, L., Jaume, M., Morisset, C.: Formal definition and comparison of access control models. Journal of Information Assurance and Security\u00a04(4), 372\u2013381 (2009)","journal-title":"Journal of Information Assurance and Security"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Hinman, P.: Fundamentals of mathematical logic. A.K. Peters, Ltd. (2005)","DOI":"10.1201\/b10690"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Jajodia, S., et al.: A unified framework for enforcing multiple access control policies. In: ACM SIGMOD International Conference on Management of Data, pp. 474\u2013485. ACM (1997)","DOI":"10.1145\/253262.253364"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-17714-9_17","volume-title":"Information Systems Security","author":"M. Jaume","year":"2010","unstructured":"Jaume, M.: Security Rules Versus Security Properties. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol.\u00a06503, pp. 231\u2013245. Springer, Heidelberg (2010)"},{"key":"12_CR22","unstructured":"Jaume, M., T\u00f4ng, V.V.T, M\u00e9, L.: Contr\u00f4le d\u2019acc\u00e8s versus contr\u00f4le de flots. In: Approches Formelles dans l\u2019Assistance au D\u00e9veloppement de Logiciels, pp. 27\u201341 (2010)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Kirchner, C., Kirchner, H., Santana de Oliveira, A.: Analysis of rewrite-based access control policies. In: Proceedings of the Third International Workshop on Security and Rewriting Techniques (SecReT 2008). ENTCS, vol.\u00a0234, pp. 55\u201375. Elsevier (2009)","DOI":"10.1016\/j.entcs.2009.02.072"},{"issue":"4","key":"12_CR24","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"N. Li","year":"2006","unstructured":"Li, N., Tripunitara, M.V.: Security analysis in role-based access control. ACM Transactions on Information and System Security (TISSEC)\u00a09(4), 391\u2013420 (2006)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer\u00a029, 38\u201347 (1996)","journal-title":"Computer"},{"issue":"2","key":"12_CR26","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3233\/JCS-2007-15202","volume":"15","author":"M.V. Tripunitara","year":"2007","unstructured":"Tripunitara, M.V., Li, N.: A theory for comparing the expressive power of access control models. Journal of Computer Security\u00a015(2), 231\u2013272 (2007)","journal-title":"Journal of Computer Security"},{"key":"12_CR27","unstructured":"Ullman, J.: Database and Knowledge - Base Systems. Classical Database Systems, vol.\u00a01. Computer Science Press (1988)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T22:02:16Z","timestamp":1742335336000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}