{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:01:55Z","timestamp":1725544915453},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540326281"},{"type":"electronic","value":"9783540326298"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11679219_14","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T07:36:41Z","timestamp":1140680201000},"page":"187-202","source":"Crossref","is-referenced-by-count":0,"title":["Normative Specification: A Tool for Trust and Security"],"prefix":"10.1007","author":[{"given":"Olga","family":"Pacheco","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1111\/j.1755-2567.1988.tb00717.x","volume":"54","author":"N. Belnap","year":"1989","unstructured":"Belnap, N., Perloff, M.: Seeing To It That: A Canonical Form for Agentives. Theoria\u00a054, 175\u2013199 (1989)","journal-title":"Theoria"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: A Flexible Model for the Specification and Enforcement of Authorizations in Workflow Management Systems. In: Proceedings of 2nd ACM Workshop on Role Based Access Control, pp. 1\u201312 (1997)","DOI":"10.1145\/266741.266746"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-94-010-0387-2_4","volume-title":"Handbook of Philosophical Logic","author":"J. Carmo","year":"2002","unstructured":"Carmo, J., Jones, A.: Deontic Logic and Contrary-to-Duties. In: Gabbay, D., Guenthner, F. (eds.) Handbook of Philosophical Logic, 2nd edn., vol.\u00a08, pp. 265\u2013343. Kluwer Academic Publishers, Dordrecht (2002)","edition":"2"},{"issue":"2,3","key":"14_CR4","first-page":"129","volume":"48","author":"J. Carmo","year":"2001","unstructured":"Carmo, J., Pacheco, O.: Deontic and action logics for organized collective agency, modeled through institutionalized agents and roles. Fundamenta Informaticae\u00a048(2,3), 129\u2013163 (2001)","journal-title":"Fundamenta Informaticae"},{"key":"14_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511621192","volume-title":"Modal Logic - an Introduction","author":"B.J. Chellas","year":"1980","unstructured":"Chellas, B.J.: Modal Logic - an Introduction. Cambridge University Press, Cambridge (1980)"},{"key":"14_CR6","unstructured":"Cuppens, F.: Roles and Deontic Logic. In: Jones, A.J.I., Sergot, M. (eds.) Proceedings of Second International Workshop on Deontic Logic in Computer Science (DEON 1994), NRCCL, Oslo, Complex 1\/94, pp. 86\u2013106 (1994)"},{"key":"14_CR7","unstructured":"Elgesem, D.: Action Theory and Modal Logic, PhD thesis, Department of Philosophy, University of Oslo (1993)"},{"key":"14_CR8","first-page":"131","volume-title":"International Workshop on Regulated Agent-Based Social Systems (RASTA 2002)","author":"G. Governatori","year":"2002","unstructured":"Governatori, G., Gelati, J., Rotolo, A., Sartor, G.: Actions, Institutions, Powers. Preliminary Notes. In: RASTA 2002,Fachbereich Informatik, Universit\u00e4t Hamburg, pp. 131\u2013147 (2002)"},{"volume-title":"Deontic Logic: Introductory and Sistematic Readings","year":"1971","key":"14_CR9","unstructured":"Hilpinen, R. (ed.): Deontic Logic: Introductory and Sistematic Readings. D.Reidel, Dordrecht (1971)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Jones, A.J.I., Sergot, M.J.: A Formal Characterization of Institutionalized Power. Journal of the IGPL\u00a04(3), 429\u2013445 1996); Garz\u00f3n Vald\u00e9s, E., Krawietz,W., von Wright, G.H., and Zimmerling,R., (eds.): Normative Systems in Legal and Moral Theory (Festschrift for Carlos E. Alchourr\u00f3n and Eugenio Bulygin). Duncker & Humblot, Berlin. pp.349-369 (1996) (Reprinted)","DOI":"10.1093\/jigpal\/4.3.427"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Kanger, S.: Law and Logic. Theoria\u00a038 (1972)","DOI":"10.1111\/j.1755-2567.1972.tb00928.x"},{"key":"14_CR12","volume-title":"Synthese Library","author":"L. Lindahl","year":"1977","unstructured":"Lindahl, L.: Position and Change - A Study in Law and Logic. In: Synthese Library, vol.\u00a0112. D. Reidel, Dordrecht (1977)"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science(LNAI)","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/BFb0035639","volume-title":"Qualitative and Quantitative Practical Reasoning","author":"F. Massacci","year":"1997","unstructured":"Massacci, F.: Reasoning about Security: a Logic and a Decision Method for Role- Based Access Control. In: Nonnengart, A., Kruse, R., Ohlbach, H.J., Gabbay, D.M. (eds.) FAPR 1997 and ECSQARU 1997. LNCS(LNAI), vol.\u00a01244, pp. 421\u2013435. Springer, Heidelberg (1997)"},{"key":"14_CR14","first-page":"3","volume-title":"Deontic Logic in Computer Science: Normative System Specification","author":"J.J.C. Meyer","year":"1993","unstructured":"Meyer, J.J.C., Wieringa, R.J.: Deontic Logic: A Concise Overview. In: Meyer, J.J.C., Wieringa, R.J. (eds.) Deontic Logic in Computer Science: Normative System Specification, pp. 3\u201316. John Wiley & Sons, Chichester (1993)"},{"issue":"3","key":"14_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1145\/352591.352592","volume":"9","author":"N. Minsky","year":"2000","unstructured":"Minsky, N., Ungureanu, V.: Law-Governed Interaction: A Coordination and Control Mechanism for Heterogeneous Distributed Systems. ACM Transactions on Software Engineering and Methodology (TOSEM)\u00a09(3), 273\u2013305 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"14_CR16","unstructured":"Pacheco, O., Carmo, J.: Collective Agents: from Law to AI. In: Proceedings of 2nd French-American Conference on Law and Artificial Intelligence, Nice (1998)"},{"issue":"2","key":"14_CR17","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1023\/A:1021884118023","volume":"6","author":"O. Pacheco","year":"2003","unstructured":"Pacheco, O., Carmo, J.: A Role Based Model for the Normative Specification of Organized Collective Agency and Agents Interaction. Journal of Autonomous Agents and Multi-Agent Systems\u00a06(2), 145\u2013184 (2003)","journal-title":"Journal of Autonomous Agents and Multi-Agent Systems"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"P\u00f6rn, I.: Action Theory and Social Science: Some Formal Models. Synthese Library, vol.\u00a0120. D. Reidel, Dordrecht (1977)","DOI":"10.1007\/978-94-010-1268-3"},{"key":"14_CR19","first-page":"333","volume-title":"Contemporary Action Theory, II (Social Action), Synthese Library","author":"F. Santos","year":"1997","unstructured":"Santos, F., Jones, A.J.I., Carmo, J.: Responsibility for Action in Organizations: a Formal Model. In: Holmstrom-Hintikka, G., Tuomela, R. (eds.) Contemporary Action Theory, II (Social Action), Synthese Library, vol.\u00a0267, pp. 333\u2013350. Kluwer, Dordrecht (1997)"},{"key":"14_CR20","series-title":"Workshops in Computing Series","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-1-4471-1488-8_11","volume-title":"Deontic Logic, Agency and Normative Systems","author":"F. Santos","year":"1996","unstructured":"Santos, F., Carmo, J.: Indirect Action, Influence and Responsibility. In: Brown, M., Carmo, J. (eds.) Deontic Logic, Agency and Normative Systems. Workshops in Computing Series, pp. 194\u2013215. Springer, Heidelberg (1996)"},{"key":"14_CR21","series-title":"Advances in Soft Computing","volume-title":"Proc.Workshop on Monitoring, Security and Rescue Techniques in Multiagent Systems (MSRAS 2004)","author":"M. Sergot","year":"2004","unstructured":"Sergot, M.: Modelling unreliable and untrustworthy agent behavior. In: Proc.Workshop on Monitoring, Security and Rescue Techniques in Multiagent Systems (MSRAS 2004), Poland. Advances in Soft Computing. Springer, Heidelberg (2004)"},{"key":"14_CR22","unstructured":"Skarmeas, N.: Modeling Organizations using Roles and Agents. In: Proceedings of 5h Hellenic Conference on Informatics, Athens (1995)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11679219_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T02:06:54Z","timestamp":1555466814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11679219_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540326281","9783540326298"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11679219_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}