{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:57:51Z","timestamp":1729645071484,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cnsm.2010.5691331","type":"proceedings-article","created":{"date-parts":[[2011,1,17]],"date-time":"2011-01-17T21:12:04Z","timestamp":1295298724000},"page":"72-79","source":"Crossref","is-referenced-by-count":9,"title":["Decomposition techniques for policy refinement"],"prefix":"10.1109","author":[{"given":"Robert","family":"Craven","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Lobo","sequence":"additional","affiliation":[]},{"given":"Emil","family":"Lupu","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Russo","sequence":"additional","affiliation":[]},{"given":"Morris","family":"Sloman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/11907466_18","article-title":"Conflict prevention via model-driven policy refinement","volume":"4269","author":"davy","year":"2006","journal-title":"DSOM ser Lecture Notes in Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2006.5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2004.1309146"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2008.105"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037383"},{"key":"ref3","article-title":"Distributed policy scenario","author":"craven","year":"2010","journal-title":"ITA Technical Report"},{"key":"ref6","first-page":"18","article-title":"The ponder policy specification language","volume":"1995","author":"damianou","year":"2001","journal-title":"POLICY ser LNCS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143123"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(91)90224-P"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1655062.1655068"},{"key":"ref2","article-title":"An expressive policy analysis framework with enhanced system dynamicity","author":"craven","year":"2008","journal-title":"Technical Report Department of Computing Imperial College London"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/1533057.1533091","article-title":"Expressive policy analysis with enhanced system dynamicity","author":"craven","year":"2009","journal-title":"ASIACCS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2004.1309175"}],"event":{"name":"2010 International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2010,10,25]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2010,10,29]]}},"container-title":["2010 International Conference on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5668576\/5691186\/05691331.pdf?arnumber=5691331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T18:30:15Z","timestamp":1497897015000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5691331\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2010.5691331","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}