{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:56:23Z","timestamp":1772243783001,"version":"3.50.1"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"abstract":"<jats:p>Policies are convenient means to modify system behaviour at run-time. Nowadays, policies are created in great numbers by different actors, ranging from system administrators to lay-users. However, this situation may lead naturally to inconsistencies, a problem that has been recognized and termed policy conflict.<\/jats:p>","DOI":"10.3233\/978-1-60750-014-8-59","type":"book-chapter","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T08:43:21Z","timestamp":1740386601000},"source":"Crossref","is-referenced-by-count":0,"title":["Detecting policy conflicts by model checking UML state machines"],"prefix":"10.3233","author":[{"family":"Ter Beek Maurice H.","sequence":"additional","affiliation":[]},{"family":"Gnesi Stefania","sequence":"additional","affiliation":[]},{"family":"Montangero Carlo","sequence":"additional","affiliation":[]},{"family":"Semini Laura","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Feature Interactions in Software and Communication Systems X"],"original-title":[],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T09:09:34Z","timestamp":1740388174000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-60750-014-8&spage=59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-60750-014-8-59","relation":{"is-cited-by":[{"id-type":"doi","id":"10.1007\/978-3-030-30985-5_1","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009]]}}}