{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T00:04:01Z","timestamp":1710547441808},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T00:00:00Z","timestamp":1248912000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Stud Logica"],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s11225-009-9201-6","type":"journal-article","created":{"date-parts":[[2009,7,29]],"date-time":"2009-07-29T14:32:16Z","timestamp":1248877936000},"page":"395-436","source":"Crossref","is-referenced-by-count":12,"title":["Fibred Security Language"],"prefix":"10.1007","volume":"92","author":[{"given":"Guido","family":"Boella","sequence":"first","affiliation":[]},{"given":"Dov M.","family":"Gabbay","sequence":"additional","affiliation":[]},{"given":"Valerio","family":"Genovese","sequence":"additional","affiliation":[]},{"given":"Leendert","family":"van der Torre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,30]]},"reference":[{"key":"9201_CR1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.entcs.2007.02.002","volume":"172","author":"M. Abadi","year":"2007","unstructured":"Abadi M.: \u2018Access Control in a Core Calculus of Dependency\u2019. Electr. Notes Theor. Comput. Sci. 172, 5\u201331 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"9201_CR2","unstructured":"Abadi, M., \u2018Variations in Access Control Logic\u2019, in R. van der Meyden, and L. van der Torre, (eds.), DEON, vol. 5076 of LNCS, Springer, 2008, pp. 96\u2013109."},{"key":"9201_CR3","doi-asserted-by":"crossref","unstructured":"Abadi, M., M. Burrows, B. W. Lampson, and G. D. Plotkin, \u2018A Calculus for Access Control in Distributed Systems\u2019, in Adcances in Cryptology (CRYPTO), vol. 576 of LNCS, Springer, 1991, pp. 1\u201323.","DOI":"10.1007\/3-540-46766-1_1"},{"key":"9201_CR4","doi-asserted-by":"crossref","unstructured":"Abadi, M., and T. Wobber, \u2018A Logical Account of NGSCB\u2019, in D. de Frutos-Escrig, and M. N\u00fa\u00f1ez, (eds.), Formal Techniques for Networked and Distributed Systems (FORTE), vol. 3235 of LNCS, Springer, 2004, pp. 1\u201312.","DOI":"10.1007\/978-3-540-30232-2_1"},{"key":"9201_CR5","unstructured":"Barker, S., \u2018The Next 700 Access Control Models or a Unifying Meta-Model?\u2019, ACM Symposium on Access Control Models and Technologies SACMAT 09 (to appear)."},{"key":"9201_CR6","doi-asserted-by":"crossref","unstructured":"Bauer, L., M. A. Schneider, Edward W. Felten, and A. W. Appel, \u2018Access Control on the Web Using Proof-carrying Authorization\u2019, in DARPA Information Survivability Conference and Exposition (DISCEX), IEEE Computer Society, 2003, pp. 117\u2013119.","DOI":"10.1109\/DISCEX.2003.1194942"},{"key":"9201_CR7","doi-asserted-by":"crossref","unstructured":"Becker, M. Y., C\u00e9dric Fournet, and Andrew D. Gordon, \u2018Design and Semantics of a Decentralized Authorization Language\u2019, in IEEE Computer Security Foundations Symposium (CSF), IEEE Computer Society, 2007, pp. 3\u201315.","DOI":"10.1109\/CSF.2007.18"},{"key":"9201_CR8","doi-asserted-by":"crossref","unstructured":"Bertolissi, C., M. Fern\u00e1ndez, and S. Barker, \u2018Dynamic Event-Based Access Control as Term Rewriting\u2019, in S. Barker, and G.-J. Ahn, (eds.), Data and Applications Security (DBSec), vol. 4602 of LNCS, Springer, 2007, pp. 195\u2013210.","DOI":"10.1007\/978-3-540-73538-0_15"},{"issue":"1","key":"9201_CR9","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/69.43410","volume":"1","author":"S. Ceri","year":"1989","unstructured":"Ceri S., Georg Gottlob, Letizia Tanca: \u2018What you Always Wanted to Know About Datalog (And Never Dared to Ask)\u2019. IEEE Trans. Knowl. Data Eng. 1(1), 146\u2013166 (1989)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9201_CR10","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.entcs.2006.08.028","volume":"168","author":"M.A.C. Dekker","year":"2007","unstructured":"Dekker M.A.C., Sandro Etalle: \u2018Audit-Based Access Control for Electronic Health Records\u2019. Electr. Notes Theor. Comput. Sci. 168, 221\u2013236 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"9201_CR11","unstructured":"Ellison, C., B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, \u2018SPKI certificate theory\u2019, IETF RFC 2693, (2009)."},{"key":"9201_CR12","unstructured":"Gabbay, D. M., \u2018Labelled Deductive Systems: Vol. 1\u2019, Oxford University Press, (1996)."},{"key":"9201_CR13","doi-asserted-by":"crossref","unstructured":"Gabbay, D. M., \u2018Fibring Logics\u2019, Oxford University Press, (1999).","DOI":"10.1093\/oso\/9780198503811.001.0001"},{"key":"9201_CR14","unstructured":"Garg, D., and M. Abadi, \u2018A Modal Deconstruction of Access Control Logics\u2019, in Foundations of Software Science and Computational Structures (FoSSaCS), vol. 4962 of LNCS, Springer, 2008, pp. 216\u2013230."},{"key":"9201_CR15","unstructured":"Garg, D., L. Bauer, Kevin D. Bowers, F. Pfenning, and M. K. Reiter, \u2018A Linear Logic of Authorization and Knowledge\u2019, in European Symposium on Research in Computer Security (ESORICS), vol. 4189 of LNCS, Springer, 2006, pp. 297\u2013312."},{"key":"9201_CR16","doi-asserted-by":"crossref","unstructured":"Giuri, L., and P. Iglio, \u2018Role Templates for Content-based Access Control\u2019, in ACM Workshop on Role-Based Access Control, 1997, pp. 153\u2013159.","DOI":"10.1145\/266741.266773"},{"key":"9201_CR17","doi-asserted-by":"crossref","unstructured":"Gurevich, Y., and I. Neeman, \u2018DKAL: Distributed-Knowledge Authorization Language\u2019, in IEEE Computer Security Foundations Symposium (CSF), IEEE Computer Society, 2008, pp. 149\u2013162.","DOI":"10.1109\/CSF.2008.8"},{"key":"9201_CR18","doi-asserted-by":"crossref","unstructured":"Halpern, J. Y., and V. Weissman, \u2018Using First-Order Logic to Reason about Policies\u2019. ACM Trans. Inf. Syst. Secur., 11 (4), 2008.","DOI":"10.1145\/1380564.1380569"},{"key":"9201_CR19","doi-asserted-by":"crossref","unstructured":"Kosiyatrakul, T., S. Older, and S.-K. Chin, \u2018A Modal Logic for Role-Based Access Control\u2019, in V. Gorodetsky, I. V. Kotenko, and V. A. Skormin, (eds.), MMMACNS, vol. 3685 of LNCS, Springer, 2005, pp. 179\u2013193.","DOI":"10.1007\/11560326_14"},{"issue":"6","key":"9201_CR20","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2004.17","volume":"37","author":"B.W. Lampson","year":"2004","unstructured":"Lampson B.W.: \u2018Computer Security in the Real World\u2019. IEEE Computer 37(6), 37\u201346 (2004)","journal-title":"IEEE Computer"},{"issue":"4","key":"9201_CR21","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B.W. Lampson","year":"1992","unstructured":"Lampson B.W., Abadi M., Burrows M., Wobber E.: \u2018Authentication in Distributed Systems: Theory and Practice\u2019. ACM Trans. Comput. Syst. 10(4), 265\u2013310 (1992)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1","key":"9201_CR22","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li N., Grosof B.N., Feigenbaum J.: \u2018Delegation logic: A Logic-based Approach to Distributed Authorization\u2019. ACM Trans. Inf. Syst. Secur. 6(1), 128\u2013171 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9201_CR23","doi-asserted-by":"crossref","unstructured":"Li, N., and J. C. Mitchell, \u2018DATALOG with Constraints: A Foundation for Trust Management Languages\u2019, in V. Dahl, and P. Wadler, (eds.), PADL, vol. 2562 of LNCS, Springer, 2003, pp. 58\u201373.","DOI":"10.1007\/3-540-36388-2_6"},{"key":"9201_CR24","doi-asserted-by":"crossref","unstructured":"Lupu, E., and M. Sloman, \u2018Reconciling Role Based Management and Role Based Access Control\u2019, in ACM Workshop on Role-Based Access Control, 1997, pp. 135\u2013141.","DOI":"10.1145\/266741.266770"},{"issue":"1","key":"9201_CR25","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/174613.174614","volume":"12","author":"E. Wobber","year":"1994","unstructured":"Wobber E., Abadi M., Burrows M.: \u2018Authentication in the Taos Operating System\u2019. ACM Trans. Comput. Syst. 12(1), 3\u201332 (1994)","journal-title":"ACM Trans. Comput. Syst."}],"container-title":["Studia Logica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11225-009-9201-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11225-009-9201-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11225-009-9201-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T15:14:57Z","timestamp":1710515697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11225-009-9201-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,30]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["9201"],"URL":"https:\/\/doi.org\/10.1007\/s11225-009-9201-6","relation":{},"ISSN":["0039-3215","1572-8730"],"issn-type":[{"value":"0039-3215","type":"print"},{"value":"1572-8730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,30]]}}}