{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:17:05Z","timestamp":1725488225240},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410201"},{"type":"electronic","value":"9783540452638"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45263-x_9","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T05:15:42Z","timestamp":1185858942000},"page":"133-147","source":"Crossref","is-referenced-by-count":9,"title":["Law-Governed Internet Communities"],"prefix":"10.1007","author":[{"given":"Xuhui","family":"Ao","sequence":"first","affiliation":[]},{"given":"Naftaly","family":"Minsky","sequence":"additional","affiliation":[]},{"given":"Thu D.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Victoria","family":"Ungureanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,11]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000.","key":"9_CR1","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"9_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-63383-9_74","volume-title":"Proc. of Coordination\u201997: Second International Conference on Coordination Models and Languages","author":"N.H. Minsky","year":"1997","unstructured":"N.H. Minsky and V. Ungureanu. Regulated coordination in open distributed systems. In David Garlan and Daniel Le Metayer, editors, Proc. of Coordination\u201997: Second International Conference on Coordination Models and Languages; LNCS 1282, pages 81\u201398, September 1997."},{"doi-asserted-by":"crossref","unstructured":"N.H. Minsky and V. Ungureanu. A mechanism for establishing policies for electronic commerce. In The 18th International Conference on Distributed Computing Systems (ICDCS), pages 322\u2013331, May 1998.","key":"9_CR3","DOI":"10.1109\/ICDCS.1998.679732"},{"unstructured":"N.H. Minsky and V. Ungureanu. Unified support for heterogeneous security policies in distributed systems. In 7th USENIX Security Symposium, January 1998.","key":"9_CR4"},{"doi-asserted-by":"crossref","unstructured":"N.H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. TOSEM, ACM Transactions on Software Engineering and Methodology, 2000. (to be published, and currently available through http:\/\/www.cs.rutgers.edu\/minsky\/ ).","key":"9_CR5","DOI":"10.1145\/352591.352592"},{"unstructured":"N.H. Minsky, V. Ungureanu, W. Wang, and J. Zhang. Building reconfiguration primitives into the law of a system. In Proc. of the Third International Conference on Configurable Distributed Systems (ICCDS\u201996), March 1996. (available through http:\/\/www.cs.rutgers.edu\/minsky\/ .","key":"9_CR6"},{"doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 message digest algorithm. Technical report, MIT, April 1992. RFC 1320.","key":"9_CR7","DOI":"10.17487\/rfc1321"},{"unstructured":"R. Rivest and B. Lampson. SDSI-a simple distributed security infrastructure. Technical report, MIT, 1996. http:\/\/theory.lcs.mit.edu\/rivest\/sdsi.ps .","key":"9_CR8"},{"unstructured":"B. Schneier. Applied Cryptography. John Wiley and Sons, 1996.","key":"9_CR9"},{"unstructured":"A. Tanenbaum. Distributed Operating Systems. Prentice Hall, 1995.","key":"9_CR10"}],"container-title":["Lecture Notes in Computer Science","Coordination Languages and Models"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45263-X_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:50:22Z","timestamp":1556725822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45263-X_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410201","9783540452638"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45263-x_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}