{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:57:42Z","timestamp":1725796662850},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439357"},{"type":"electronic","value":"9783662439364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_17","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T12:05:04Z","timestamp":1403870704000},"page":"260-275","source":"Crossref","is-referenced-by-count":7,"title":["Incremental Analysis of Evolving Administrative Role Based Access Control Policies"],"prefix":"10.1007","author":[{"given":"Silvio","family":"Ranise","sequence":"first","affiliation":[]},{"given":"Anh","family":"Truong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-22438-6_4","volume-title":"Automated Deduction \u2013 CADE-23","author":"F. Alberti","year":"2011","unstructured":"Alberti, F., Armando, A., Ranise, S.: ASASP: Automated Symbolic Analysis of Security Policies. In: Bj\u00f8rner, N., Sofronie-Stokkermans, V. (eds.) CADE 2011. LNCS, vol.\u00a06803, pp. 26\u201333. Springer, Heidelberg (2011)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Alberti, F., Armando, A., Ranise, S.: Efficient Symbolic Automated Analysis of Administrative Role Based Access Control Policies. In: ASIACCS. ACM Pr. (2011)","DOI":"10.1145\/1966913.1966935"},{"issue":"2&3","key":"17_CR3","doi-asserted-by":"crossref","first-page":"149","DOI":"10.3233\/JCS-1996-42-303","volume":"4","author":"P. Ammann","year":"1996","unstructured":"Ammann, P., Lipton, R., Sandhu, R.: The expressive power of multi-parent creation in monotonic access control models. JCS\u00a04(2&3), 149\u2013196 (1996)","journal-title":"JCS"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-22444-7_2","volume-title":"Security and Trust Management","author":"A. Armando","year":"2011","unstructured":"Armando, A., Ranise, S.: Automated Symbolic Analysis of ARBAC-Policies. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 17\u201334. Springer, Heidelberg (2011)"},{"issue":"4","key":"17_CR5","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/JCS-2012-0461","volume":"20","author":"A. Armando","year":"2012","unstructured":"Armando, A., Ranise, S.: Scalable Automated Symbolic Analysis of ARBAC Policies by SMT Solving. JCS\u00a020(4), 309\u2013352 (2012)","journal-title":"JCS"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-642-36742-7_30","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A.L. Ferrara","year":"2013","unstructured":"Ferrara, A.L., Madhusudan, P., Parlato, G.: Policy Analysis for Self-administrated Role-Based Access Control. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013 (ETAPS 2013). LNCS, vol.\u00a07795, pp. 432\u2013447. Springer, Heidelberg (2013)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-642-14203-1_3","volume-title":"Automated Reasoning","author":"S. Ghilardi","year":"2010","unstructured":"Ghilardi, S., Ranise, S.: MCMT: A Model Checker Modulo Theories. In: Giesl, J., H\u00e4hnle, R. (eds.) IJCAR 2010. LNCS, vol.\u00a06173, pp. 22\u201329. Springer, Heidelberg (2010)"},{"key":"17_CR8","unstructured":"Gofman, M., Yang, P.: Efficient Policy Analysis for Evolving Administrative Role Based Access Control. Int. J. of Software and Informatics (to appear, 2014)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-15497-3_28","volume-title":"Computer Security \u2013 ESORICS 2010","author":"M.I. Gofman","year":"2010","unstructured":"Gofman, M.I., Luo, R., Yang, P.: User-role reachability analysis of evolving administrative role based access control. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 455\u2013471. Springer, Heidelberg (2010)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-642-25560-1_8","volume-title":"Information Systems Security","author":"P. Gupta","year":"2011","unstructured":"Gupta, P., Stoller, S.D., Xu, Z.: Abductive analysis of administrative policies in rule-based access control. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol.\u00a07093, pp. 116\u2013130. Springer, Heidelberg (2011)"},{"issue":"8","key":"17_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of ACM"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Jayaraman, K., Ganesh, V., Tripunitara, M., Rinard, M., Chapin, S.: Automatic Error Finding for Access-Control Policies. In: CCS. ACM (2011)","DOI":"10.1145\/2046707.2046727"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-45853-0_14","volume-title":"Computer Security - ESORICS 2002","author":"M. Koch","year":"2002","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: Decidability of Safety in Graph-Based Models for Access Control. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 229\u2013244. Springer, Heidelberg (2002)"},{"issue":"4","key":"17_CR14","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"N. Li","year":"2006","unstructured":"Li, N., Tripunitara, M.V.: Security analysis in role-based access control. ACM TISSEC\u00a09(4), 391\u2013420 (2006)","journal-title":"ACM TISSEC"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Ramalingam, G., Reps, T.: A Categorized Bibliography on Incremental Computation. In: Proc. of POPL, pp. 502\u2013510. ACM (1993)","DOI":"10.1145\/158511.158710"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1112\/plms\/s2-30.1.264","volume":"s2-30","author":"F.P. Ramsey","year":"1930","unstructured":"Ramsey, F.P.: On a Problem of Formal Logic. Proceedings of the London Mathematical Society\u00a0s2-30(1), 264\u2013286 (1930)","journal-title":"Proceedings of the London Mathematical Society"},{"issue":"1","key":"17_CR17","first-page":"24","volume":"42","author":"S. Ranise","year":"2013","unstructured":"Ranise, S.: Symbolic Backward Reachability with Effectively Propositional Logic\u2014Applications to Security Policy Analysis. FMSD\u00a042(1), 24\u201345 (2013)","journal-title":"FMSD"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-38004-4_18","volume-title":"Security and Trust Management","author":"S. Ranise","year":"2013","unstructured":"Ranise, S., Truong, A., Armando, A.: Boosting Model Checking to Analyse Large ARBAC Policies. In: J\u00f8sang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol.\u00a07783, pp. 273\u2013288. Springer, Heidelberg (2013)"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"1","author":"R. Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based control administration of roles. ACM TISSEC\u00a01(2), 105\u2013135 (1999)","journal-title":"ACM TISSEC"},{"issue":"29","key":"17_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"2","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youmann, C.: Role-Based Access Control Models. IEEE Computer\u00a02(29), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"44","key":"17_CR21","doi-asserted-by":"publisher","first-page":"6208","DOI":"10.1016\/j.tcs.2011.05.009","volume":"412","author":"A. Sasturkar","year":"2011","unstructured":"Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy Analysis for Administrative Role Based Access Control. TCS\u00a0412(44), 6208\u20136234 (2011)","journal-title":"TCS"},{"key":"17_CR22","unstructured":"Soshi, M., Maekawa, M., Okamoto, E.: The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. IEICE-TF\u00a0(1), 1\u201314 (2004)"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Stoller, S.D., Yang, P., Ramakrishnan, C.R., Gofman, M.I.: Efficient policy analysis for administrative role based access control. In: CCS. ACM Press (2007)","DOI":"10.1145\/1315245.1315300"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T05:02:57Z","timestamp":1558933377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}