{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:13:41Z","timestamp":1729620821017,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/noms.2010.5488453","type":"proceedings-article","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T18:37:30Z","timestamp":1277404650000},"page":"155-162","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic obligation specification and negotiation"],"prefix":"10.1109","author":[{"given":"Mario","family":"Lischka","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377857"},{"year":"2007","key":"ref11"},{"journal-title":"OASIS XACML version 3 0 Obligation Families Version 1 0","year":"2007","key":"ref12"},{"journal-title":"OASIS eXtensible Access Control Markup Language (XACML) 2 0","year":"2009","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.10"},{"key":"ref15","first-page":"77","article-title":"Prohairetic deontic logic (pdl)","author":"van","year":"1998","journal-title":"editors Logics in Artificial Intelligence European Workshop JELIA'98"},{"journal-title":"W3C Web Service policy 1 5-Framework","year":"2007","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1655028.1655045"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011288"},{"key":"ref6","first-page":"37","article-title":"Deductive Policies with XACML","author":"lische ka","year":"2009","journal-title":"Proc ACM Workshop Secure Web Services"},{"key":"ref5","first-page":"18","article-title":"The ponder policy specification language","author":"damianou","year":"2001","journal-title":"editors POLICY volume 1995 of Lecture Notes in Computer Science"},{"key":"ref8","first-page":"92","article-title":"Ensuring integrity by adding obligations to privileges","author":"minsky","year":"1985","journal-title":"Proceedings 8th International Conference on Software Engineering"},{"key":"ref7","article-title":"Implementation of a Management Agent for Interpreting Obligation Policy","author":"marriott","year":"1996","journal-title":"IEEE\/IFIP Workshop on Distributed Systems Operations and Management (DSOM'96)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.13"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"369","DOI":"10.3233\/JCS-2008-0328","article-title":"A privacy-aware access control system","volume":"16","author":"ardagna","year":"2008","journal-title":"Journal of Computer Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2007.30"}],"event":{"name":"2010 IEEE Network Operations and Management Symposium - NOMS 2010","start":{"date-parts":[[2010,4,19]]},"location":"Osaka, Japan","end":{"date-parts":[[2010,4,23]]}},"container-title":["2010 IEEE Network Operations and Management Symposium - NOMS 2010"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5482535\/5488304\/05488453.pdf?arnumber=5488453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T11:39:22Z","timestamp":1559216362000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5488453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/noms.2010.5488453","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}