{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:25:04Z","timestamp":1725704704456},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/commnet.2019.8742348","type":"proceedings-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T23:23:21Z","timestamp":1561073001000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines"],"prefix":"10.1109","author":[{"given":"Meryeme","family":"Ayache","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Khoumsi","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Erradi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553562"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689459"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.12.019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205988"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35890-6_10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2017.8076625"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0357-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-017-9394-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.12694\/scpe.v17i3.1180"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1739230.1739253"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59647-1_13"},{"journal-title":"OpenStack Open Source Cloud Computing Software","year":"2010","author":"murphy","key":"ref5"},{"journal-title":"Detecting incompleteness conflicting and unreachability XACML policies using answer set programming","year":"2015","author":"ramli","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968563"},{"journal-title":"AspectJ in Action Enterprise AOP with Spring Applications","year":"2009","author":"laddad","key":"ref2"},{"key":"ref9","article-title":"From model-driven specification to design-level set-based analysis of XACML policies","author":"mourad","year":"2015","journal-title":"Computers & Electrical Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.10.034"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0040-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2646639"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.11.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS111216033D"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1739230.1739237"}],"event":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","start":{"date-parts":[[2019,4,12]]},"location":"Rabat, Morocco","end":{"date-parts":[[2019,4,14]]}},"container-title":["2019 International Conference on Advanced Communication Technologies and Networking (CommNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8734471\/8742344\/08742348.pdf?arnumber=8742348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:19:50Z","timestamp":1658247590000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8742348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/commnet.2019.8742348","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}