{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:19:35Z","timestamp":1725898775480},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_12","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"180-193","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Dynamic Security Policy in the Java Security Manager"],"prefix":"10.1007","author":[{"given":"Fabien","family":"Autrel","sequence":"first","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Mi\u00e8ge, Y.D.A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, Policy 2003 (2003)"},{"key":"12_CR2","unstructured":"Cuppens-Boulahia, N., Cuppens, F., Coma, C.: Multi-granular licences to decentralize security administration. In: First International Workshop on Reliability, Availability, and Security (WRAS), Paris, France (2007)"},{"key":"12_CR3","unstructured":"Samson, F.: Alternative Java Security Policy Model. Phd. thesis, Universit\u00e9 Laval (2004)"},{"key":"12_CR4","unstructured":"River, A.: Jini: a network architecture for the construction of distributed systems (2010), \n                    \n                      http:\/\/river.apache.org"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Ferrailo, D.F., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST standard for rbac. ACM Transactions on Information and System Security (2001)","DOI":"10.1145\/501978.501980"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R.: Towards remote policy enforcement for runtime protection of mobile code using trusted computing (2006)","DOI":"10.1007\/11908739_13"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1145\/253260.253364","volume-title":"Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data, SIGMOD 1997","author":"S. Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data, SIGMOD 1997, pp. 474\u2013485. ACM, New York (1997)"},{"key":"12_CR8","unstructured":"Dragovic, I.I.B., Crispo, B.: Extending the java virtual machine to enforce fine-grained security policies in mobile devices. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC (2007)"},{"key":"12_CR9","unstructured":"Ribeiro, C., Z\u00faquete, A., Ferreira, P., Guedes, P.: Spl: An access control language for security policies with complex constraints. In: Proceedings of the Network and Distributed System Security Symposium, pp. 89\u2013107 (1999)"},{"key":"12_CR10","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Sans, T., Mi\u00e8ge, A.: A formal approach to specify and deploy a network security policy. In: Second Workshop on Formal Aspects in Security and Trust, FAST (2004)"},{"key":"12_CR11","first-page":"64","volume-title":"Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC 2001","author":"D. Wheeler","year":"2001","unstructured":"Wheeler, D., Conyers, A., Luo, J., Xiong, A.: Java security extensions for a java server in a hostile environment. In: Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC 2001, p. 64. IEEE Computer Society, Washington, DC (2001)"},{"key":"12_CR12","unstructured":"Ullman, J.D.: Principles of database and knowledge-base systems. Computer Science Press (1989)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. International Journal of Information Security (IJIS) 7(4) (August 2008)","DOI":"10.1007\/s10207-007-0051-9"},{"key":"12_CR14","unstructured":"Autrel, F., Cuppens, F., Cuppens-Boulahia, N., Coma, C.: Motorbac 2: a security policy tool. In: Third Joint Conference on Security in Networks Architectures and Security of Information Systems, SARSSI (2008)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T00:28:05Z","timestamp":1557620885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}