{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:13:00Z","timestamp":1725455580010},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351297"},{"type":"electronic","value":"9783642351303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35130-3_8","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T07:09:45Z","timestamp":1355123385000},"page":"104-118","source":"Crossref","is-referenced-by-count":0,"title":["On Policies and Intents"],"prefix":"10.1007","author":[{"given":"Matthew L.","family":"Bolton","sequence":"first","affiliation":[]},{"given":"Celeste M.","family":"Wallace","sequence":"additional","affiliation":[]},{"given":"Lenore D.","family":"Zuck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Applebaum, A., Levitt, K.N., Rowe, J., Parsons, S.: Arguing about firewall policy. In: Verheij, B., Szeider, S., Woltran, S. (eds.) Computational Models of Argument - Proceedings of COMMA 2012, Vienna, Austria, September 10-12. Frontiers in Artificial Intelligence and Applications, vol.\u00a0245, pp. 91\u2013102. IOS Press (2012)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Firewall policy advisor for anomaly detection and rule editing. In: Proc. IEEE\/IFIP 8th Int. Symp. Integrated Network Management, IM 2003, pp. 17\u201330 (March 2003)","DOI":"10.1007\/978-0-387-35674-7_2"},{"key":"8_CR3","unstructured":"Al-Shaer, E., Hamed, H.: Discovery of policy anomalies in distributed firewalls. In: INFOCOM (2004)"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11334-010-0129-9","volume":"6","author":"M.L. Bolton","year":"2010","unstructured":"Bolton, M.L., Bass, E.J.: Formally verifying human-automation interaction as part of a system model: Limitations and tradeoffs. Innovations in Systems and Software Engineering: A NASA Journal\u00a06(3), 219\u2013231 (2010)","journal-title":"Innovations in Systems and Software Engineering: A NASA Journal"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Bolton, M.L., Bass, E.J., Siminiceanu, R.I.: Using formal verification to evaluate human-automation interaction in safety critical systems, a review. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans (in press, expected 2012)","DOI":"10.1109\/TSMCA.2012.2210406"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: Proceedings of 27th IEEE Symposium on Security and Privacy (May 2006)","DOI":"10.1109\/SP.2006.32"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadula, L.: Secure computer system unified exposition and multics interpretation. Technical Report MTR-2997, MITRE Corp., Bedford, MA (July 1975)","DOI":"10.21236\/ADA023588"},{"issue":"5","key":"8_CR8","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/TSMCA.2011.2109709","volume":"41","author":"M.L. Bolton","year":"2011","unstructured":"Bolton, M.L., Siminiceanu, R.I., Bass, E.J.: A systematic approach to model checking human-automation interaction using task-analytic models. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans\u00a041(5), 961\u2013976 (2011)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans"},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/356810.356816","volume":"12","author":"L.D. Erman","year":"1980","unstructured":"Erman, L.D., Hayes-Roth, F., Lesser, V.R., Reddy, D.R.: The hearsay-II speech understanding system: Integrating knowledge to resolve uncertainty. ACM Computing Surveys\u00a012(2), 213\u2013253 (1980)","journal-title":"ACM Computing Surveys"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-85992-5_8","volume-title":"Engineering Interactive Systems","author":"M. Giese","year":"2008","unstructured":"Giese, M., Mistrzyk, T., Pfau, A., Szwillus, G., von Detten, M.: AMBOSS: A Task Modeling Approach for Safety-Critical Systems. In: Forbrig, P., Patern\u00f2, F. (eds.) HCSE\/TAMODIA 2008. LNCS, vol.\u00a05247, pp. 98\u2013109. Springer, Heidelberg (2008)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-45608-2_4","volume-title":"Foundations of Security Analysis and Design","author":"J.D. Guttman","year":"2001","unstructured":"Guttman, J.D.: Security Goals: Packet Trajectories and Strand Spaces. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 197\u2013261. Springer, Heidelberg (2001)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Harel, D., Marelly, R.: Come, let\u2019s play: Scenario-based programming using LSCs and the play-engine. Springer (2003)","DOI":"10.1007\/978-3-642-19029-2"},{"issue":"7","key":"8_CR13","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/2209249.2209270","volume":"55","author":"D. Harel","year":"2012","unstructured":"Harel, D., Marron, A., Weiss, G.: Behavioral programming. Commun. ACM\u00a055(7), 90\u2013100 (2012)","journal-title":"Commun. ACM"},{"issue":"3","key":"8_CR14","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0004-3702(85)90063-3","volume":"26","author":"B. Hayes-Roth","year":"1985","unstructured":"Hayes-Roth, B.: A blackboard architecture for control. Artificial Intelligence\u00a026(3), 251\u2013321 (1985)","journal-title":"Artificial Intelligence"},{"issue":"8","key":"8_CR15","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"issue":"3","key":"8_CR16","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/98188.98191","volume":"8","author":"H.R. Hartson","year":"1990","unstructured":"Hartson, H.R., Siochi, A.C., Hix, D.: The UAN: A user-oriented representation for direct manipulation interface designs. ACM Transactions on Information Systems\u00a08(3), 181\u2013203 (1990)","journal-title":"ACM Transactions on Information Systems"},{"key":"8_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/b16826","volume-title":"A Guide to Task Analysis","author":"B. Kirwan","year":"1992","unstructured":"Kirwan, B., Ainsworth, L.K.: A Guide to Task Analysis. Taylor and Francis, London (1992)"},{"issue":"1","key":"8_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/32.825764","volume":"26","author":"N.G. Leveson","year":"2000","unstructured":"Leveson, N.G.: Intent specifications: An approach to building human-centered specifications. IEEE Transactions on Software Engineering\u00a026(1), 15\u201335 (2000)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/TSMC.1986.4308966","volume":"16","author":"C.M. Mitchell","year":"1986","unstructured":"Mitchell, C.M., Miller, R.A.: A discrete control model of operator function: A methodology for information display design. IEEE Transactions on Systems Man Cybernetics Part A: Systems and Humans\u00a016(3), 343\u2013357 (1986)","journal-title":"IEEE Transactions on Systems Man Cybernetics Part A: Systems and Humans"},{"key":"8_CR20","first-page":"7","volume-title":"Mental Models","author":"D. Norman","year":"1983","unstructured":"Norman, D.: Some observations on mental models. In: Gentner, D., Stevens, A.L. (eds.) Mental Models, pp. 7\u201314. Lawrence Erlbaum Associates, Mahwah (1983)"},{"key":"8_CR21","first-page":"362","volume-title":"Proceedings of the IFIP TC13 Interantional Conference on Human-Computer Interaction","author":"F. Patern\u00f2","year":"1997","unstructured":"Patern\u00f2, F., Mancini, C., Meniconi, S.: ConcurTaskTrees: A diagrammatic notation for specifying task models. In: Proceedings of the IFIP TC13 Interantional Conference on Human-Computer Interaction, pp. 362\u2013369. Chapman and Hall, Ltd., London (1997)"},{"issue":"4","key":"8_CR22","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/21.17380","volume":"18","author":"K.S. Rubin","year":"1988","unstructured":"Rubin, K.S., Jones, P.M., Mitchell, C.M.: OFMspert: Inference of operator intentions in supervisory control using a blackboard architecture. IEEE Transactions on Systems, Man and Cybernetics\u00a018(4), 618\u2013637 (1988)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Rahmouni, H.B., Solomonides, T., Mont, M.C., Shiu, S.: Privacy compliance and enforcement on european healthgrids: an appraoch through ontology. Philosophical Transactions of the Royal Society (368), 4057\u20134072 (2010)","DOI":"10.1098\/rsta.2010.0169"},{"key":"8_CR24","doi-asserted-by":"crossref","DOI":"10.4324\/9781410605795","volume-title":"Cognitive Task Analysis","author":"J.M. Schraagen","year":"2000","unstructured":"Schraagen, J.M., Chipman, S.F., Shalin, V.L.: Cognitive Task Analysis. Lawrence Erlbaum Associates, Inc., Philadelphia (2000)"},{"issue":"6","key":"8_CR25","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A. Wool","year":"2004","unstructured":"Wool, A.: A quantitative study of firewall configuration errors. Computer\u00a037(6), 62\u201367 (2004)","journal-title":"Computer"},{"issue":"4","key":"8_CR26","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIC.2010.29","volume":"14","author":"A. Wool","year":"2010","unstructured":"Wool, A.: Trends in firewall configuration errors: Measuring the holes in swiss cheese. IEEE Internet Computing\u00a014(4), 58\u201365 (2010)","journal-title":"IEEE Internet Computing"},{"key":"8_CR27","unstructured":"Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C., Mohapatra, P.: FIREMAN: A toolkit for FIREwall Modeling and ANalysis. In: IEEE Symposium on Security and Privacy, pp. 199\u2013213. IEEE Computer Society (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35130-3_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T21:44:40Z","timestamp":1643838280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35130-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351297","9783642351303"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35130-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}