{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T10:08:05Z","timestamp":1775297285382,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/policy.2003.1206958","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"63-74","source":"Crossref","is-referenced-by-count":208,"title":["A policy language for a pervasive computing environment"],"prefix":"10.1109","author":[{"given":"L.","family":"Kagal","sequence":"first","affiliation":[]},{"given":"T.","family":"Finin","sequence":"additional","affiliation":[]},{"family":"Anupam Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1080\/10919399409540214"},{"key":"17","author":"mally","year":"1926","journal-title":"The Basic Laws of Ought Elements of the Logic of Willing"},{"key":"18","first-page":"3","article-title":"Deontic logic: A concise overview","author":"meyer","year":"1993","journal-title":"Deontic Logic in Computer Science"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.1997.628345"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"13","article-title":"A framework for distributed trust management","author":"kagal","year":"2001","journal-title":"IJCAI-01 Workshop on Autonomy Delegation and Control"},{"key":"14","article-title":"A security architecture based on trust management for pervasive computing systems","author":"kagal","year":"2002","journal-title":"Proceedings of the Grace Hopper Celebration of Women in Computing 2002"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/2.970591"},{"key":"12","article-title":"Developing secure agent systems using delegation based trust management","author":"kagal","year":"2002","journal-title":"Security of Mobile MultiAgent Systems (SEMAS 02) held at Autonomous Agents and MultiAgent Systems"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/10722777_9"},{"key":"20","author":"morciniec","year":"2001","journal-title":"Towards Regulating Electronic Communities with Contracts"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"24","article-title":"Swedish institute of computer science","year":"2001","journal-title":"SICStus Prolog"},{"key":"25","article-title":"Internetwork mobility: The CDPD approach","author":"taylor","year":"1999","journal-title":"Prentice Hall Professional Technical Reference"},{"key":"26","article-title":"A secure infrastructure for service discovery and management in pervasive computing. to be published in","author":"undercoffer","year":"2003","journal-title":"ACM MONET The Journal of Special Issues on Mobility of Systems Users Data and Computing"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/65.1.507"},{"key":"28","year":"0","journal-title":"Extensible Markup Language"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"3","article-title":"Representation and reasoning for DAML-based policy and domain services in KAoS and Nomads","author":"bradshaw","year":"2002","journal-title":"Under Review"},{"key":"2","author":"boley","year":"2001","journal-title":"RuleML"},{"key":"10","article-title":"Rei: A policy language for the me-centric project","author":"kagal","year":"2002","journal-title":"HP Labs Technical Report"},{"key":"1","year":"0","journal-title":"The Official Bluetooth Website"},{"key":"30","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","article-title":"Authorizations in distributed systems: A new approach","volume":"2","author":"woo","year":"1993","journal-title":"Journal of Computer Security"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-09237-4","author":"harel","year":"1979","journal-title":"First-order Dynamic Logic"},{"key":"6","author":"dean","year":"2002","journal-title":"Web Ontology Language (Owl) Reference"},{"key":"5","article-title":"The ponder policy specification language","author":"damianou","year":"1995","journal-title":"LNCS"},{"key":"4","article-title":"RDF vocabulary description language 1.0: RDF schema","author":"brickley","year":"2002","journal-title":"W3C Working Draft"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"8","author":"van harmelen","year":"2002","journal-title":"DAML+OIL Language Specifications"}],"event":{"name":"POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","location":"Lake Como, Italy","acronym":"POLICY-03"},"container-title":["Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8577\/27164\/01206958.pdf?arnumber=1206958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,21]],"date-time":"2018-04-21T10:17:05Z","timestamp":1524305825000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/policy.2003.1206958","relation":{},"subject":[]}}