{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:58:27Z","timestamp":1725843507710},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319274355"},{"type":"electronic","value":"9783319274362"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27436-2_7","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T02:06:46Z","timestamp":1450231606000},"page":"107-123","source":"Crossref","is-referenced-by-count":1,"title":["A Typed Language for Events"],"prefix":"10.1007","author":[{"given":"Sandra","family":"Alves","sequence":"first","affiliation":[]},{"given":"Sabine","family":"Broda","sequence":"additional","affiliation":[]},{"given":"Maribel","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,17]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/978-3-319-17822-6_9","volume-title":"Logic-Based Program Synthesis and Transformation","author":"S Alves","year":"2015","unstructured":"Alves, S., Degtyarev, A., Fern\u00e1ndez, M.: Access control and obligations in the category-based metamodel: a rewrite-based semantics. In: Proietti, M., Seki, H. (eds.) LOPSTR 2014. LNCS, vol. 8981, pp. 148\u2013163. Springer, Heidelberg (2015)"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172752","volume-title":"Term rewriting and all that","author":"F Baader","year":"1998","unstructured":"Baader, F., Nipkow, T.: Term rewriting and all that. Cambridge University Press, Great Britain (1998)"},{"doi-asserted-by":"crossref","unstructured":"Barker, S.: Action-status access control. In: Proceedings of SACMAT 2007, pp. 195\u2013204. ACM (2007)","key":"7_CR3","DOI":"10.1145\/1266840.1266873"},{"doi-asserted-by":"crossref","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of SACMAT 2009, pp. 187\u2013196. ACM (2009)","key":"7_CR4","DOI":"10.1145\/1542207.1542238"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/1410234.1410235","volume":"12","author":"S Barker","year":"2008","unstructured":"Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inform. Syst. Secur. 12(1), 1:1\u20131:47 (2008)","journal-title":"ACM Trans. Inform. Syst. Secur."},{"doi-asserted-by":"crossref","unstructured":"Bell, D.E., Lapadula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical report ESD-TR-75-306, The MITRE Corporation (1976)","key":"7_CR6","DOI":"10.21236\/ADA023588"},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inform. Syst. Secur. 4(3), 191\u2013233 (2001)","journal-title":"ACM Trans. Inform. Syst. Secur."},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-540-73538-0_15","volume-title":"Data and Applications Security XXI","author":"C Bertolissi","year":"2007","unstructured":"Bertolissi, C., Fern\u00e1ndez, M., Barker, S.: Dynamic event-based access control as term rewriting. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 195\u2013210. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Craven, R., Lobo, J., Ma, J., Russo, A., Lupu, E., Bandara, A.: Expressive policy analysis with enhanced system dynamicity. In: Proceedings of ASIACCS 2009, pp. 239\u2013250. ACM (2009)","key":"7_CR9","DOI":"10.1145\/1533057.1533091"},{"doi-asserted-by":"crossref","unstructured":"Davidson, D.: Essays on Actions and Events. Oxford University Press (2001)","key":"7_CR10","DOI":"10.1093\/0199246270.001.0001"},{"key":"7_CR11","volume-title":"Role-Based Access Control","author":"D Ferraiolo","year":"2003","unstructured":"Ferraiolo, D., Kuhn, R., Chandramouli, R.: Role-Based Access Control. Artech House, Norwood (2003)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-89982-2_7","volume-title":"Logic Programming","author":"M Gelfond","year":"2008","unstructured":"Gelfond, M., Lobo, J.: Authorization and obligation policies in dynamic systems. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol. 5366, pp. 22\u201336. Springer, Heidelberg (2008)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-540-74835-9_35","volume-title":"Computer Security \u2013 ESORICS 2007","author":"M Hilty","year":"2007","unstructured":"Hilty, M., Pretschner, A., Basin, D., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 531\u2013546. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: Proceedings of CCS 2006, pp. 134\u2013143. ACM (2006)","key":"7_CR14","DOI":"10.1145\/1180405.1180423"},{"issue":"1\u20132","key":"7_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/0743-1066(92)90041-Z","volume":"12","author":"R Kowalski","year":"1992","unstructured":"Kowalski, R.: Database updates in the event calculus. J. Logic Program. 12(1\u20132), 121\u2013146 (1992)","journal-title":"J. Logic Program."},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-32689-9_1","volume-title":"Rules on the Web: Research and Applications","author":"R Kowalski","year":"2012","unstructured":"Kowalski, R., Sadri, F.: A logic-based framework for reactive systems. In: Bikakis, A., Giurca, A. (eds.) RuleML 2012. LNCS, vol. 7438, pp. 1\u201315. Springer, Heidelberg (2012)"},{"issue":"1","key":"7_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"R Kowalski","year":"1986","unstructured":"Kowalski, R., Sergot, M.: A Logic-based Calculus of Events. New Gen. Comput. 4(1), 67\u201395 (1986)","journal-title":"New Gen. Comput."},{"issue":"A","key":"7_CR18","first-page":"77","volume":"3","author":"R Miller","year":"1999","unstructured":"Miller, R., Shanahan, M.: The Event calculus in classical logic - alternative axiomatisations. Electron. Trans. Artif. Intell. 3(A), 77\u2013105 (1999)","journal-title":"Electron. Trans. Artif. Intell."},{"doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proceedings of SACMAT 2008, pp. 133\u2013142. ACM (2008)","key":"7_CR19","DOI":"10.1145\/1377836.1377857"},{"issue":"6","key":"7_CR20","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1145\/218570.218572","volume":"17","author":"A Ohori","year":"1995","unstructured":"Ohori, A.: A polymorphic record calculus and its compilation. ACM Trans. Program. Lang. Syst. 17(6), 844\u2013895 (1995)","journal-title":"ACM Trans. Program. Lang. Syst."},{"doi-asserted-by":"crossref","unstructured":"Pontual, M., Chowdhury, O., Winsborough, W.H., Yu, T., Irwin, K.: On the management of user obligations. In: Proceedings of SACMAT 2011, pp. 175\u2013184. ACM (2011)","key":"7_CR21","DOI":"10.1145\/1998441.1998473"},{"doi-asserted-by":"crossref","unstructured":"Ranise, S., Truong, A.T., Armando, A.: Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of SACMAT 2014, pp. 103\u2013114 (2014)","key":"7_CR22","DOI":"10.1145\/2613087.2613102"},{"doi-asserted-by":"crossref","unstructured":"Ranise, S., Truong, A.T., Vigan\u00f2, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: Proceedings of SAC 2015, pp. 2177\u20132184 (2015)","key":"7_CR23","DOI":"10.1145\/2695664.2695787"}],"container-title":["Lecture Notes in Computer Science","Logic-Based Program Synthesis and Transformation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27436-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:07:34Z","timestamp":1559333254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27436-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319274355","9783319274362"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27436-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}