{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:32:13Z","timestamp":1725582733272},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642208317"},{"type":"electronic","value":"9783642208324"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20832-4_18","type":"book-chapter","created":{"date-parts":[[2011,4,27]],"date-time":"2011-04-27T22:59:49Z","timestamp":1303945189000},"page":"280-299","source":"Crossref","is-referenced-by-count":4,"title":["Refinement of History-Based Policies"],"prefix":"10.1007","author":[{"given":"Jorge","family":"Lobo","sequence":"first","affiliation":[]},{"given":"Jiefei","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Russo","sequence":"additional","affiliation":[]},{"given":"Emil","family":"Lupu","sequence":"additional","affiliation":[]},{"given":"Seraphin","family":"Calo","sequence":"additional","affiliation":[]},{"given":"Morris","family":"Sloman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Calo, S.B., Lee, K.-W., Lobo, J.: Issues in designing a policy language for distributed management of it infrastructures. In: Integrated Network Management, pp. 30\u201339 (2007)","DOI":"10.1109\/INM.2007.374767"},{"key":"18_CR2","unstructured":"Bandara, A.K.: A Formal Approach to Analysis and Refinement of Policies. PhD thesis, Imperial College London (2005)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Olmedilla, D.: Rule-based policy representation and reasoning for the semantic web. In: Reasoning Web, pp. 240\u2013268 (2007)","DOI":"10.1007\/978-3-540-74615-7_4"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/210197.210200","volume":"20","author":"J. Chomicki","year":"1995","unstructured":"Chomicki, J.: Efficient checking of temporal integrity constraints using bounded history encoding. ACM Trans. Database Syst.\u00a020(2), 149\u2013186 (1995)","journal-title":"ACM Trans. Database Syst."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Craven, R., Lobo, J., Lupu, E., Russo, A., Sloman, M.: Decomposition techniques for policy refinement. In: International Conference on Network and Service Management (2010)","DOI":"10.1109\/CNSM.2010.5691331"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Craven, R., Lobo, J., Ma, J., Russo, A., Lupu, E., Bandara, A., Calo, S., Sloman, M.: Expressive policy analysis with enhanced system dynamicity. In: ASIACCS 2009 (2009)","DOI":"10.1145\/1533057.1533091"},{"key":"18_CR7","first-page":"519","volume-title":"Eighteenth National Conference on Artificial Intelligence","author":"A. Gabaldon","year":"2002","unstructured":"Gabaldon, A.: Non-markovian control in the situation calculus. In: Eighteenth National Conference on Artificial Intelligence, pp. 519\u2013524. American Association for Artificial Intelligence, Menlo Park (2002)"},{"key":"18_CR8","first-page":"1070","volume-title":"Proceedings of the Fifth International Conference on Logic Programming","author":"M. Gelfond","year":"1988","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Kowalski, R.A., Bowen, K. (eds.) Proceedings of the Fifth International Conference on Logic Programming, pp. 1070\u20131080. The MIT Press, Cambridge (1988)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Gelfond, M., Lobo, J.: Authorization and obligation policies in dynamic systems. In: ICLP, pp. 22\u201336 (2008)","DOI":"10.1007\/978-3-540-89982-2_7"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11225-005-0498-5","volume":"79","author":"G. Gonzalez","year":"2005","unstructured":"Gonzalez, G., Baral, C., Gelfond, M.: Alan: An action language for modelling non-markovian domains. Studia Logica\u00a079(1), 115\u2013134 (2005)","journal-title":"Studia Logica"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/CSF.2008.8","volume-title":"CSF 2008: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium","author":"Y. Gurevich","year":"2008","unstructured":"Gurevich, Y., Neeman, I.: Dkal: Distributed-knowledge authorization language. In: CSF 2008: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, pp. 149\u2013162. IEEE Computer Society, Washington, DC (2008)"},{"issue":"2","key":"18_CR12","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst.\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Trans. Database Syst."},{"key":"18_CR13","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1145\/1242572.1242664","volume-title":"WWW 2007: Proceedings of the 16th International Conference on World Wide Web","author":"V. Kolovski","year":"2007","unstructured":"Kolovski, V., Hendler, J., Parsia, B.: Analyzing web access control policies. In: WWW 2007: Proceedings of the 16th International Conference on World Wide Web, pp. 677\u2013686. ACM, New York (2007)"},{"issue":"3","key":"18_CR14","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1145\/1066100.1066103","volume":"52","author":"N. Li","year":"2005","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. J. ACM\u00a052(3), 474\u2013514 (2005)","journal-title":"J. ACM"},{"issue":"3","key":"18_CR15","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/cpe.1194","volume":"20","author":"E. Lupu","year":"2008","unstructured":"Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.-L., Schaeffer-Filho, A.: Amuse: autonomic management of ubiquitous e-health systems. Concurr. Comput.: Pract. Exper.\u00a020(3), 277\u2013295 (2008)","journal-title":"Concurr. Comput. : Pract. Exper."},{"key":"18_CR16","unstructured":"OASIS. OASIS eXtensible Access Control Markup Language (XACML) TC (2005)"},{"issue":"5","key":"18_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/35.492975","volume":"34","author":"S.A. Yemini","year":"1996","unstructured":"Yemini, S.A., Kliger, S., Mozes, E., Yemini, Y., Ohsie, D.: High speed and robust event correlation. Communications Magazine\u00a034(5), 82\u201390 (1996)","journal-title":"Communications Magazine"}],"container-title":["Lecture Notes in Computer Science","Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20832-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T03:57:36Z","timestamp":1637553456000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20832-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642208317","9783642208324"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20832-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}