{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:01:58Z","timestamp":1725652918478},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_19","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"234-241","source":"Crossref","is-referenced-by-count":0,"title":["A Metamodel of the B Modeling of Access-Control Policies: Work in Progress"],"prefix":"10.1007","author":[{"given":"J\u00e9r\u00e9my","family":"Milhau","sequence":"first","affiliation":[]},{"given":"Marc","family":"Frappier","sequence":"additional","affiliation":[]},{"given":"R\u00e9gine","family":"Laleau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abrial, J.R.: The B-Book: Assigning Programs to Meanings. Cambridge University Press (1996)","DOI":"10.1017\/CBO9780511624162"},{"key":"19_CR2","unstructured":"Consortium, T.O.: ORKA \u2014 Organizational Control Architecture (2010), \n                    \n                      http:\/\/www.organisatorische-kontrolle.de\/index-en.htm"},{"key":"19_CR3","unstructured":"Embe-Jiague, M., St-Denis, R., Laleau, R., Gervais, F.: A bpel implementation of a security filter. In: PhD Symposium of 8th European Conference on Web Services (2010)"},{"key":"19_CR4","unstructured":"Fraikin, B., Gervais, F., Frappier, M., Laleau, R., Richard, M.: Synthesizing information systems: the apis project. In: First International Conference on Research Challenges in Information Science (RCIS), Ouarzazate, Morocco, p. 12 (April 2007)"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s11334-008-0064-1","volume":"4","author":"M. Frappier","year":"2008","unstructured":"Frappier, M., Gervais, F., Laleau, R., Fraikin, B., St-Denis, R.: Extending statecharts with process algebra operators. Innovations in Systems and Software Engineering\u00a04(3), 285\u2013292 (2008)","journal-title":"Innovations in Systems and Software Engineering"},{"key":"19_CR6","unstructured":"Idani, A.: B\/UML: Mise en relation de sp\u00e9cifications B et de descriptions UML pour l\u2019aide \u00e0 la validation externe de d\u00e9veloppements formels en B (2006)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/978-3-540-45236-2_46","volume-title":"FME 2003: Formal Methods","author":"M. Leuschel","year":"2003","unstructured":"Leuschel, M., Butler, M.J.: Prob: A Model Checker for B. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol.\u00a02805, pp. 855\u2013874. Springer, Heidelberg (2003)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-16265-7_18","volume-title":"Integrated Formal Methods","author":"J. Milhau","year":"2010","unstructured":"Milhau, J., Frappier, M., Gervais, F., Laleau, R.: Systematic Translation Rules from astd to Event-B. In: M\u00e9ry, D., Merz, S. (eds.) IFM 2010. LNCS, vol.\u00a06396, pp. 245\u2013259. Springer, Heidelberg (2010)"},{"issue":"4","key":"19_CR10","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11334-011-0166-z","volume":"7","author":"J. Milhau","year":"2011","unstructured":"Milhau, J., Idani, A., Laleau, R., Labiadh, M.A., Ledru, Y., Frappier, M.: Combining UML, ASTD and B for the formal specification of an access control filter. Innovations in Systems and Software Engineering\u00a07(4), 303\u2013313 (2011)","journal-title":"Innovations in Systems and Software Engineering"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Neumann, G., Strembeck, M.: An approach to engineer and enforce context constraints in an rbac environment. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, pp. 65\u201379 (2003)","DOI":"10.1145\/775412.775421"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:14:38Z","timestamp":1556151278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}