{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:24:45Z","timestamp":1730291085145,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596051","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"169-176","source":"Crossref","is-referenced-by-count":12,"title":["Model-based specification and refinement of usage control policies"],"prefix":"10.1109","author":[{"given":"Ricardo","family":"Neisse","sequence":"first","affiliation":[{"name":"European Commission Joint Research Center Institute for the Protection and Security of the Citizen Ispra, Italy"}]},{"given":"Joerg","family":"Doerr","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Experimental Software Engineering Kaiserslautern, Germany"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19125-1_1"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2004.1309175"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1125808.1125810"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691331"},{"key":"18","first-page":"231","article-title":"Foundations of security analysis and design vi","author":"lund","year":"2011","journal-title":"Foundations of Security Analysis and Design VI A Aldini and R Gorrieri"},{"key":"24","first-page":"227","article-title":"Ontology-based policy refinement using swrl rules for management information definitions in owl","author":"guerrero","year":"2006","journal-title":"Proceedings of the 17th IFIP\/IEEE International Conference on Distributed Systems Operations and Management"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1145\/984334.984339","article-title":"The ucon abc usage control model","author":"park","year":"2004","journal-title":"ACM Trans Inf Syst Secur"},{"key":"16","first-page":"412","article-title":"Umlsec: Extending uml for secure systems development","author":"j?urjens","year":"2002","journal-title":"Proceedings of the 5th International Conference on The Unified Modeling Language"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.10"},{"journal-title":"Extensible Access Control Markup Language v3 0","year":"2010","author":"rissanen","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28879-1_9"},{"key":"12","article-title":"Save: Software architecture visualization and evaluation","author":"knodel","year":"2009","journal-title":"12th European Conference on Software Maintenance and Reengineering (CSMR 2008)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36563-8_5"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2011.35"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.40"},{"key":"1","first-page":"124","article-title":"Usage control enforcement with data flow tracking for x11","author":"pretschner","year":"2009","journal-title":"Proc 5th Intl Workshop on Security and Trust Management"},{"key":"10","article-title":"An overview of the mop runtime verification framework","author":"meredith","year":"2011","journal-title":"Int J Softw Tools for Technol Transfer"},{"journal-title":"Model-Driven Design of Distributed Applications","year":"2006","author":"paulo","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774108"},{"journal-title":"Action Relations - Basic Design Concepts for Behaviour Modelling and Refinement","year":"1998","author":"quartel","key":"5"},{"journal-title":"Consistency in Multi-viewpoint Architectural Design","year":"2006","author":"dijkman","key":"4"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1145\/1368310.1368344","article-title":"Mechanisms for usage control","author":"pretschner","year":"2008","journal-title":"Proceedings of the 2008 ACM Symposium on Information Computer and Communications Security (ASIACCS)"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-74835-9_35","article-title":"A policy language for distributed usage control","volume":"4734","author":"hilty","year":"2007","journal-title":"Computer Security ESORICS 2007 Ser Lecture Notes in Computer Science"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596051.pdf?arnumber=6596051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T19:35:51Z","timestamp":1623094551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6596051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596051","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}