{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:38Z","timestamp":1750221278798,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T00:00:00Z","timestamp":1507852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,13]]},"DOI":"10.1145\/3136825.3136887","type":"proceedings-article","created":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T13:06:00Z","timestamp":1516971960000},"page":"67-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Attribute-based approach of defining the secure behavior of automata objects"],"prefix":"10.1145","author":[{"given":"Fedor","family":"Novikov","sequence":"first","affiliation":[{"name":"SPbPU, St. Petersburg, Russia"}]},{"given":"Ludmila","family":"Fedorchenko","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]},{"given":"Vladimir","family":"Vorobiev","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]},{"given":"Roza","family":"Fatkieva","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]},{"given":"Dmitriy","family":"Levonevskiy","sequence":"additional","affiliation":[{"name":"SPIIRAS, St. Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2017,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp","author":"Langeheinrich M.","year":"2011","unstructured":"M. Langeheinrich . 2011 . Privacy by Design \u00e2\u0102\u015e Principles of Privacy Aware Ubiquitous System . In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp 2011). ACM, New York, NY, 273--291. M. Langeheinrich. 2011. Privacy by Design \u00e2\u0102\u015e Principles of Privacy Aware Ubiquitous System. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp 2011). ACM, New York, NY, 273--291."},{"volume-title":"Smart Environments: Technologies, Protocols, and Applications.","author":"Nixon P.A.","key":"e_1_3_2_1_2_1","unstructured":"&Dstrok;\u015a P.A. Nixon , W. Wagealla , C. English , S. Terzis . 2005. Chapter 11. Security , Privacy and Trust Issues in Smart Environments . In Smart Environments: Technologies, Protocols, and Applications. New York : Wiley . &Dstrok;\u015aP.A. Nixon, W. Wagealla, C. English, S. Terzis. 2005. Chapter 11. Security, Privacy and Trust Issues in Smart Environments. In Smart Environments: Technologies, Protocols, and Applications. New York: Wiley."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66471-2_15"},{"key":"e_1_3_2_1_4_1","volume-title":"Fedorchenko et al","author":"Atiskov A.Y.","year":"2013","unstructured":"A.Y. Atiskov , F.A. Novikov , L. N. Fedorchenko et al . 2013 . Ontology-Based Analysis of Cryptography Standards and Possibilities of Their Harmonization. In Theory and Practice of Cryptography Solutions for Secure Information Systems . Hershey : IGI Global , 1--33. A.Y. Atiskov, F.A. Novikov, L.N. Fedorchenko et al. 2013. Ontology-Based Analysis of Cryptography Standards and Possibilities of Their Harmonization. In Theory and Practice of Cryptography Solutions for Secure Information Systems. Hershey: IGI Global, 1--33."},{"volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft J.E.","key":"e_1_3_2_1_5_1","unstructured":"J.E. Hopcroft , R. Motwani , J.D. 2001. Ullman . Introduction to Automata Theory, Languages, and Computation . Addison-Wesley , 521 p. J.E. Hopcroft, R. Motwani, J.D. 2001. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 521 p."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2011.10.1.a3"},{"volume-title":"Abstract State Machines. A Method for High-Level System Design and Analysis","author":"B\u00c3\u00fcrger E.","key":"e_1_3_2_1_7_1","unstructured":"E. B\u00c3\u00fcrger , R. St\u00c3d'rk . 2003. Abstract State Machines. A Method for High-Level System Design and Analysis . Springer , Berlin , 438 p. E. B\u00c3\u00fcrger, R. St\u00c3d'rk. 2003. Abstract State Machines. A Method for High-Level System Design and Analysis. Springer, Berlin, 438 p."},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"36","article-title":"Three Kinds of Behavior Models","volume":"12","author":"Bock C.","year":"1999","unstructured":"C. Bock . 1999 . Three Kinds of Behavior Models . Journal of Object-Oriented Programming. 12 ( 4 ), 36 -- 39 . C. Bock. 1999. Three Kinds of Behavior Models. Journal of Object-Oriented Programming. 12 (4), 36--39.","journal-title":"Journal of Object-Oriented Programming."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"volume-title":"Object-Oriented Software Construction","author":"Meyer B.","key":"e_1_3_2_1_10_1","unstructured":"B. Meyer . 2000. Object-Oriented Software Construction . Prentice-Hall , New Jersey , 1406 p. B. Meyer. 2000. Object-Oriented Software Construction. Prentice-Hall, New Jersey, 1406 p."},{"key":"e_1_3_2_1_11_1","unstructured":"L. Fedorchenko. 2006. On Regularization of Context-Free Grammars. Izvestiya vuzov. Priborostroyeniye. 49 (11) 50\u00e2\u0102\u015e54.  L. Fedorchenko. 2006. On Regularization of Context-Free Grammars. Izvestiya vuzov. Priborostroyeniye. 49 (11) 50\u00e2\u0102\u015e54."},{"key":"e_1_3_2_1_12_1","unstructured":"K. Schwab. 2016. The Fourth Industrial Revolution. World Economic Forum.   K. Schwab. 2016. The Fourth Industrial Revolution. World Economic Forum."}],"event":{"name":"SIN '17: Security of Information and Networks","acronym":"SIN '17","location":"Jaipur India"},"container-title":["Proceedings of the 10th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136825.3136887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:17Z","timestamp":1750212677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,13]]},"references-count":12,"alternative-id":["10.1145\/3136825.3136887","10.1145\/3136825"],"URL":"https:\/\/doi.org\/10.1145\/3136825.3136887","relation":{},"subject":[],"published":{"date-parts":[[2017,10,13]]},"assertion":[{"value":"2017-10-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}