{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:16:20Z","timestamp":1773512180839,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319178219","type":"print"},{"value":"9783319178226","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17822-6_9","type":"book-chapter","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T05:57:31Z","timestamp":1429682251000},"page":"148-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics"],"prefix":"10.1007","author":[{"given":"Sandra","family":"Alves","sequence":"first","affiliation":[]},{"given":"Anatoli","family":"Degtyarev","sequence":"additional","affiliation":[]},{"given":"Maribel","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,23]]},"reference":[{"key":"9_CR1","unstructured":"ANSI. RBAC, 2004. INCITS 359\u20132004"},{"key":"9_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139172752","volume-title":"Term Rewriting and All That","author":"F Baader","year":"1998","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, Cambridge (1998)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of SACMAT 2009, pp. 187\u2013196. ACM Press (2009)","DOI":"10.1145\/1542207.1542238"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inf. Syst. Secur. 12(1), 1\u201347 (2008)","DOI":"10.1145\/1410234.1410235"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-11747-3_11","volume-title":"Engineering Secure Software and Systems","author":"C Bertolissi","year":"2010","unstructured":"Bertolissi, C., Fern\u00e1ndez, M.: Category-based authorisation models: operational semantics and expressive power. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 140\u2013156. Springer, Heidelberg (2010)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-22444-7_4","volume-title":"Security and Trust Management","author":"C Bertolissi","year":"2011","unstructured":"Bertolissi, C., Fern\u00e1ndez, M.: Rewrite specifications of access control policies in distributed environments. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 51\u201367. Springer, Heidelberg (2011)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-73538-0_15","volume-title":"Data and Applications Security XXI","author":"C Bertolissi","year":"2007","unstructured":"Bertolissi, C., Fern\u00e1ndez, M., Barker, S.: Dynamic event-based access control as term rewriting. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 195\u2013210. Springer, Heidelberg (2007)"},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1023\/A:1025711105609","volume":"11","author":"C Bettini","year":"2003","unstructured":"Bettini, C., Jajodia, S., Wang, X., Wijesekera, D.: Provisions and obligations in policy rule management. J. Netw. Syst. Manag. 11(3), 351\u2013372 (2003)","journal-title":"J. Netw. Syst. Manag."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Contejean, E., Paskevich, A., Urbain, X., Courtieu, P., Pons, O., Forest, J.: A3pat, an approach for certified automated termination proofs. In: Proceedings of PEPM 2010, pp. 63\u201372. ACM, New York (2010)","DOI":"10.1145\/1706356.1706370"},{"key":"9_CR10","doi-asserted-by":"publisher","DOI":"10.1093\/0199246270.001.0001","volume-title":"Essays on Actions and Events","author":"D Davidson","year":"2001","unstructured":"Davidson, D.: Essays on Actions and Events. Oxford University Press, Oxford (2001)"},{"key":"9_CR11","series-title":"Texts and Monographs in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5695-3","volume-title":"Selected Writings on Computing - A Personal Perspective","author":"EW Dijkstra","year":"1982","unstructured":"Dijkstra, E.W.: Selected Writings on Computing - A Personal Perspective. Texts and Monographs in Computer Science. Springer, New York (1982)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-89982-2_7","volume-title":"Logic Programming","author":"M Gelfond","year":"2008","unstructured":"Gelfond, M., Lobo, J.: Authorization and obligation policies in dynamic systems. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 22\u201336. Springer, Heidelberg (2008)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: Proceedings of CCS 2006, pp. 134\u2013143. ACM, New York (2006)","DOI":"10.1145\/1180405.1180423"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Katt, B., Zhang, X., Breu, R., Hafner, M., Seifert, J.-P.: A general obligation model and continuity: enhanced policy enforcement engine for usage control. In: Proceedings of SACMAT 2008, pp. 123\u2013132. ACM, New York (2008)","DOI":"10.1145\/1377836.1377856"},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"R Kowalski","year":"1986","unstructured":"Kowalski, R., Sergot, M.: A logic-based calculus of events. New. Gener. Comput. 4(1), 67\u201395 (1986)","journal-title":"New. Gener. Comput."},{"issue":"A","key":"9_CR16","first-page":"77","volume":"3","author":"R Miller","year":"1999","unstructured":"Miller, R., Shanahan, M.: The event calculus in classical logic - alternative axiomatisations. Electron. Trans. Artif. Intell. 3(A), 77\u2013105 (1999)","journal-title":"Electron. Trans. Artif. Intell."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Mont, M.C., Beato, F.: On parametric obligation policies: enabling privacy-aware information lifecycle management in enterprises. In: POLICY, pp. 51\u201355 (2007)","DOI":"10.1109\/POLICY.2007.30"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proceedings of SACMAT 2008, pp. 133\u2013142. ACM, New York (2008)","DOI":"10.1145\/1377836.1377857"},{"key":"9_CR19","unstructured":"OASIS. eXtensible Access Control Markup language (XACML) (2003). http:\/\/www.oasis-open.org\/xacml\/docs\/"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The ucon abc usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Pontual, M., Chowdhury, O., Winsborough, W.H., Yu, T., Irwin, K.: On the management of user obligations. In: Proceedings of SACMAT 2011, pp. 175\u2013184. ACM, New York (2011)","DOI":"10.1145\/1998441.1998473"}],"container-title":["Lecture Notes in Computer Science","Logic-Based Program Synthesis and Transformation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17822-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:46:50Z","timestamp":1676584010000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17822-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319178219","9783319178226"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17822-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}