{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:21:28Z","timestamp":1773760888516,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642294136","type":"print"},{"value":"9783642294143","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29414-3_20","type":"book-chapter","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T21:45:41Z","timestamp":1335303941000},"page":"374-400","source":"Crossref","is-referenced-by-count":4,"title":["Decentralized Governance of Distributed Systems via Interaction Control"],"prefix":"10.1007","author":[{"given":"Naftaly H.","family":"Minsky","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Ao, X., Minsky, N., Ungureanu, V.: Formal treatment of certificate revocation under communal access control. In: Proc. of the 2001 IEEE Symposium on Security and Privacy, Oakland California (May 2001)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-39650-5_3","volume-title":"Computer Security \u2013 ESORICS 2003","author":"X. Ao","year":"2003","unstructured":"Ao, X., Minsky, N.H.: Flexible Regulation of Distributed Coalitions. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 39\u201360. Springer, Heidelberg (2003)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Ao, X., Minsky, N.H.: On the role of roles: from role-based to role-sensitive access control. In: Proc. of the 9th ACM Symposium on Access Control Models and Technologies, Yorktown Hights, NY, USA (June 2004)","DOI":"10.1145\/990036.990044"},{"key":"20_CR4","unstructured":"Ao, X., Minsky, N.H.: Regulated delegation in distributed systems. In: Proc. of the IEEE 7th International Workshop on Policies for Distributed Systems and Networks, London, Ontario, Canada (June 2006)"},{"key":"20_CR5","unstructured":"Arbaugh, W., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. In: Proceedings of 1997 IEEE Symposium on Security and Privacy (1997)"},{"key":"20_CR6","unstructured":"Bandmann, O., Dam, M., Babak, S.F.: Constrained delegations. In: proceedings of 2002 IEEE Symposium on Security and Privacy (May 2002)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Barkley, J., Beznosov, K., Uppal, J.: Supporting relationships in access control using role based access control. In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, pp. 55\u201365 (October 1999)","DOI":"10.1145\/319171.319177"},{"key":"20_CR8","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations and model. Technical Report M74-244, Mitre Corp. (August 1975)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: Trbac: A temporal role-based access control model. ACM Tran. on Information and System Security\u00a04(3) (2001)","DOI":"10.1145\/501978.501979"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The keynote trust-management systems, version 2. ietf rfc 2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"20_CR11","unstructured":"Coetzee, M., Eloff, J.H.P.: Virtual enterprise access control requirements. In: Proceedings of SAICSIT 2003 Conference, pp. 285\u2013294. ACM (2003)"},{"key":"20_CR12","unstructured":"Dudheria, R., Trappe, W., Minsky, N.: Coordination and control in mobile ubiquitous computing applications using law governed interaction. In: Proc. of the Fourth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM) Florence, Italy (October 2010)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Giuri, L., Iglio, P.: Role templates for content-based access control. In: Proc. of the ACM Workshop on Role-Based Access Control, RBAC 1997 (1997)","DOI":"10.1145\/266741.266773"},{"key":"20_CR14","unstructured":"Godic, S., Moses, T.: Oasis extensible access control. markup language (xacml), version 2. Technical report, Oasis (March 2005)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"He, Z., Phan, T., Nguyen, T.D.: Enforcing enterprise-wide policies over standard client-server interactions. In: Proc. of the Symp. on Reliable Distributed Systems, SRDS (2005)","DOI":"10.4304\/jcp.1.1.1-13"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subramanian, V.S.: Flexible support for multiple access control policies. ACM Trans. on Database Systems\u00a026(2) (June 2001)","DOI":"10.1145\/383891.383894"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Joshi, J.B.D., Bertino, E., Sahfiq, B., Ghafoor, A.: Dependencies and separation of duty constraints in gtrbac. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003 (2003)","DOI":"10.1145\/775412.775420"},{"key":"#cr-split#-20_CR18.1","unstructured":"Lampson, B.W.: Protection. In: Proceedings of 5th Princeton Symposium on Information Sciences and Systems, pp. 437-443 (March 1971)"},{"key":"#cr-split#-20_CR18.2","doi-asserted-by":"crossref","unstructured":"Reprinted in ACM Operating Sysytems Revue\u00a0 8(1), 18-24 (1974)","DOI":"10.1145\/775265.775268"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Transaction on Information and System Security (TISSEC), 128\u2013171 (February 2003)","DOI":"10.1145\/605434.605438"},{"key":"20_CR20","unstructured":"McDaniel, P., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proc. of the IEEE Symp on Security and Privacy (May 2002)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-44875-6_2","volume-title":"Trust Management","author":"N.H. Minsky","year":"2003","unstructured":"Minsky, N.H.: Regularity-Based Trust in Cyberspace. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol.\u00a02692, pp. 17\u201332. Springer, Heidelberg (2003)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Naftaly, H.: Minsky. The imposition of protocols over open distributed systems. IEEE Transactions on Software Engineering (February 1991)","DOI":"10.1109\/32.67599"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Naftaly, H.: Minsky. A decentralized treatment of a highly distributed chinese-wall policy. In: Proc. of the IEEE 5th Int. Workshop on Policies for Distributed Systems and Networks, Yorktown Hights, NY, USA (June 2004)","DOI":"10.1109\/POLICY.2004.1309164"},{"key":"20_CR24","unstructured":"Minsky, N.H.: Law Governed Interaction (LGI): A Distributed Coordination and Control Mechanism (An Introduction, and a Reference Manual) (February 2006)"},{"issue":"3","key":"20_CR25","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1145\/352591.352592","volume":"9","author":"N.H. Minsky","year":"2000","unstructured":"Minsky, N.H., Ungureanu, V.: Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. TOSEM, ACM Transactions on Software Engineering and Methodology\u00a09(3), 273\u2013305 (2000)","journal-title":"TOSEM, ACM Transactions on Software Engineering and Methodology"},{"key":"20_CR26","unstructured":"Moyer, M.J., Abamad, M.: Generalized role-based access control. In: Proc. of the 21st Intern. Conf. on Distributed Computing Systems, pp. 391\u2013398 (2001)"},{"issue":"2","key":"20_CR27","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S. Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security\u00a03(2), 85\u2013106 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"20_CR28","unstructured":"Ribeiro, C., Ferreira, P.: A policy-oriented language for expressing security specifications. International Journal of Network Security\u00a05(3) (November 2007)"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Ferraiolo, D., Kuhn, R.: The nist model for role-based access control: Towards a unified standard. In: Proceedings of ACM Workshop on Role-Based Access Control. ACM (2000)","DOI":"10.1145\/344287.344301"},{"key":"20_CR30","unstructured":"Schneider, F.B. (ed.): Trust in Cyberspace. National Academy Press (1999)"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/3-540-40026-5_12","volume-title":"Distributed Computing","author":"V. Ungureanu","year":"2000","unstructured":"Ungureanu, V., Minsky, N.H.: Establishing Business Rules for Inter-Enterprise Electronic Commerce. In: Herlihy, M.P. (ed.) DISC 2000. LNCS, vol.\u00a01914, pp. 179\u2013193. Springer, Heidelberg (2000)"},{"key":"20_CR32","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1145\/355616.364017","volume":"17","author":"W. Wulf","year":"1974","unstructured":"Wulf, W., Cohen, E., Corwin, W., Jones, A., Levin, C., Pierson, C., Pollack, F.: Hydra: The kernel of a multiprocessor operating system. CACM\u00a017, 337\u2013345 (1974)","journal-title":"CACM"},{"key":"20_CR33","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-71103-2_10","volume-title":"Environments for Multi-Agent Systems III","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Serban, C., Minsky, N.H.: Establishing Global Properties of Multi-Agent Systems Via Local Laws. In: Weyns, D., Van Dyke Parunak, H., Michel, F. (eds.) E4MAS 2006. LNCS (LNAI), vol.\u00a04389, pp. 170\u2013183. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Logic Programs, Norms and Action"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29414-3_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:00:47Z","timestamp":1620126047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29414-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642294136","9783642294143"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29414-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}