{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:29:57Z","timestamp":1725755397164},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/re.2014.6912262","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:37:18Z","timestamp":1412095038000},"page":"203-212","source":"Crossref","is-referenced-by-count":19,"title":["Engineering topology aware adaptive security: Preventing requirements violations at runtime"],"prefix":"10.1109","author":[{"given":"Christos","family":"Tsigkanos","sequence":"first","affiliation":[]},{"given":"Liliana","family":"Pasquale","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Menghi","sequence":"additional","affiliation":[]},{"given":"Carlo","family":"Ghezzi","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Nuseibeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325711"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.6"},{"key":"17","article-title":"The polyadic pi-calculus: A tutorial","author":"milner","year":"1991","journal-title":"Technical Report Logic and Algebra of Specification"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02469-6_31"},{"key":"18","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1007\/3-540-48320-9_32","article-title":"Validating firewalls in mobile ambients","author":"nielson","year":"1999","journal-title":"CONCUR99 Concurrency Theory"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465479"},{"journal-title":"Computing the Accessibility Relation for the Ambient Calculus","year":"2003","author":"mardare","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25974-9_8"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/507670.507688"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48294-6_9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3390\/s100201251"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345794"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.12.001"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593939"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0096-0551(02)00009-7"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1361348.1361353"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0051-9"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292550"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(05)80699-1"},{"key":"5","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/3-540-45500-0_2","article-title":"Boxed ambients","author":"bugliesi","year":"2001","journal-title":"Proc of the 4th Int Symp of Theoretical Aspects of Computer Software"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-010-0159-y"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-37795-6_19","article-title":"Topology-aware routing in structured peer-to-peer overlay networks","author":"castro","year":"2003","journal-title":"Future Directions in Distributed Computing"}],"event":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","start":{"date-parts":[[2014,8,25]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,8,29]]}},"container-title":["2014 IEEE 22nd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6903646\/6912234\/06912262.pdf?arnumber=6912262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T13:25:48Z","timestamp":1565875548000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/re.2014.6912262","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}