{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T10:47:13Z","timestamp":1725446833965},"reference-count":35,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dance.2002.1003494","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T16:30:39Z","timestamp":1056558639000},"page":"204-215","source":"Crossref","is-referenced-by-count":6,"title":["Developing dynamic security policies"],"prefix":"10.1109","author":[{"given":"P.","family":"Naldurg","sequence":"first","affiliation":[]},{"given":"R.H.","family":"Campbell","sequence":"additional","affiliation":[]},{"given":"M.D.","family":"Mickunas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Policy framework IETF draft","year":"1999","author":"stevens","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211865"},{"journal-title":"Sec Pol Sec Pol project homepage","year":"2000","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8111"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924290"},{"key":"ref10","article-title":"Maude: Specification and programming in rewriting logic","author":"clavel","year":"2001","journal-title":"Theoretical Computer Science"},{"key":"ref11","article-title":"Ponder: A language for specifying secuirty and management policies for distributed systems","author":"damianou","year":"2000","journal-title":"Imperial College Research Report"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"ref13","article-title":"SPKI certificate theory","author":"ellison","year":"1999","journal-title":"RFC 2693"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/289423.289431"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253364"},{"key":"ref16","article-title":"A simple approach to specifying concurrent systems","author":"lamport","year":"1986","journal-title":"Report No 15"},{"key":"ref17","article-title":"Specifying concurrent systems with TLA+","author":"lamport","year":"1999","journal-title":"Calculational System Design"},{"key":"ref18","article-title":"A formal basis for the specification of concurrent systems","author":"lamport","year":"2000","journal-title":"NATO Advanced Study Institute"},{"article-title":"Securing the Node of an Active Network","year":"2001","author":"liu","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.2001.916839"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49135-X_9","article-title":"KeyNote: Trust management for public-key infrastructures","author":"blaze","year":"1998","journal-title":"Security Protocols International Workshop"},{"key":"ref27","article-title":"Security architecture for active nets","author":"murphy","year":"1998","journal-title":"AN Security Working Group"},{"key":"ref3","article-title":"Secure computer systems: Mathematical foundations and model","author":"bell","year":"1973","journal-title":"Technical Report M74&#x2013;244"},{"journal-title":"Architectural framework for active networks AN Architecture Working Group Draft","year":"1998","author":"calvert","key":"ref6"},{"key":"ref29","article-title":"Dynamic access control policies in seraphim","author":"naldurg","year":"2002","journal-title":"Technical Report"},{"journal-title":"The COPS protocol Internet Draft","year":"1999","author":"boyle","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930134"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.2000.828133"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44450-5_4"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"ref9"},{"key":"ref1","article-title":"A domain and type enforcement UNIX prototype","author":"badger","year":"1995","journal-title":"Proceedings of the 5th Usenix UNIX Security Symposium"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8648-1_11","article-title":"Securing the node of an active network","author":"liu","year":"2000","journal-title":"Active Middleware Services"},{"key":"ref22","article-title":"Pluggable active security for active networks","author":"liu","year":"2000","journal-title":"International Conference on Parallel and Distributed Computing and Systems (PDCS 2000)"},{"key":"ref21","article-title":"Flexible secure multicasting in active networks","author":"liu","year":"2000","journal-title":"ICDCS International Workshop on Group Computation and Communication"},{"key":"ref24","article-title":"Integrating flexible support for security policies into the linux operating system","author":"loscocco","year":"0","journal-title":"Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference"},{"key":"ref23","article-title":"An agent based architecture for supporting application level security","author":"liu","year":"2000","journal-title":"DARPA Information Survivability Conference and Exposition"},{"key":"ref26","article-title":"Introduction to SNMPv3","author":"mundy","year":"1999","journal-title":"RFC 2570"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213265"}],"event":{"name":"DARPA Active Networks Conference and Exposition","acronym":"DANCE-02","location":"San Francisco, CA, USA"},"container-title":["Proceedings DARPA Active Networks Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7864\/21659\/01003494.pdf?arnumber=1003494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:38:49Z","timestamp":1497551929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1003494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/dance.2002.1003494","relation":{},"subject":[]}}