{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:12:27Z","timestamp":1747807947850},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_18","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"227-233","source":"Crossref","is-referenced-by-count":1,"title":["Specification and Verification of Access Control Policies in EB3SEC: Work in Progress"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Konopacki","sequence":"first","affiliation":[]},{"given":"Hakim","family":"Belhaouari","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Frappier","sequence":"additional","affiliation":[]},{"given":"R\u00e9gine","family":"Laleau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","first-page":"133","volume-title":"Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008","author":"Q. Ni","year":"2008","unstructured":"Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, pp. 133\u2013142. ACM, New York (2008)"},{"key":"18_CR2","volume-title":"Role-Based Access Control","author":"D.F. Ferraiolo","year":"2003","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House, Inc., Norwood (2003)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Konopacki, P., Frappier, M., Laleau, R.: Expressing access control policies with an event-based approach. In: WISSE (2011)","DOI":"10.1007\/978-3-642-22056-2_63"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s10270-003-0024-z","volume":"2","author":"M. Frappier","year":"2003","unstructured":"Frappier, M., St-Denis, R.: EB3: an entity-based black-box specification method for information systems. Software and System Modeling\u00a02(2), 134\u2013149 (2003)","journal-title":"Software and System Modeling"},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s10270-005-0083-4","volume":"4","author":"B. Fraikin","year":"2005","unstructured":"Fraikin, B., Frappier, M., Laleau, R.: State-based versus event-based specifications for information systems: a comparison of B and EB3. Software and Systems Modeling\u00a04(3), 236\u2013257 (2005)","journal-title":"Software and Systems Modeling"},{"key":"18_CR6","unstructured":"Anderson, A.: XACML Profile for Role Based Access Control (RBAC). OASIS Standard (2004)"},{"key":"18_CR7","unstructured":"Kalam, A.A.E., Benferhat, S., Mi\u00e8ge, A., Baida, R.E., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2003, pp. 120\u2013130. IEEE Computer Society, Washington, DC (2003)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-3-642-16901-4_38","volume-title":"Formal Methods and Software Engineering","author":"M. Frappier","year":"2010","unstructured":"Frappier, M., Fraikin, B., Chossart, R., Chane-Yack-Fa, R., Ouenzar, M.: Comparison of Model Checking Tools for Information Systems. In: Dong, J.S., Zhu, H. (eds.) ICFEM 2010. LNCS, vol.\u00a06447, pp. 581\u2013596. Springer, Heidelberg (2010)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-89247-2_11","volume-title":"Runtime Verification","author":"H. Belhaouari","year":"2008","unstructured":"Belhaouari, H., Peschanski, F.: A Lightweight Container Architecture for Runtime Verification. In: Leucker, M. (ed.) RV 2008. LNCS, vol.\u00a05289, pp. 173\u2013187. Springer, Heidelberg (2008)"},{"key":"18_CR10","unstructured":"Moses, T.: eXtensible Access Control Markup Langage (XACML) Version 2.0. OASIS Standard (2005)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:13:25Z","timestamp":1556151205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}