{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:20:31Z","timestamp":1725618031745},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380037"},{"type":"electronic","value":"9783642380044"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38004-4_7","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T04:24:16Z","timestamp":1366604656000},"page":"97-112","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Communicating Authorization Policies"],"prefix":"10.1007","author":[{"given":"Simone","family":"Frau","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Torabi Dashti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"7_CR2","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE CS (1996)"},{"key":"7_CR3","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: IEEE S&P, p. 105 (2002)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Becker, M., Fournet, C., Gordon, A.: Design and semantics of a decentralized authorization language. In: CSF 2007, pp. 3\u201315. IEEE Computer Society (2007)","DOI":"10.1109\/CSF.2007.18"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Gurevich, Y., Neeman, I.: DKAL: Distributed-knowledge authorization language. In: CSF 2008, pp. 149\u2013162. IEEE Computer Society (2008)","DOI":"10.1109\/CSF.2008.8"},{"key":"7_CR6","unstructured":"Hammer, E., et al.: The OAuth 2.0 authorization framework (2012); IETF"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Frau, S., Torabi Dashti, M.: Integrated specification and verification of security protocols and policies. In: CSF, pp. 18\u201332. IEEE CS (2011)","DOI":"10.1109\/CSF.2011.9"},{"issue":"2","key":"7_CR8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"-29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. on Information Theory IT-29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. on Information Theory IT"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Frau, S.: Analysis of Reachability Properties in Communicating Authorization Policies. PhD Thesis, ETH Z\u00fcrich (November 2012)","DOI":"10.1007\/978-3-642-38004-4_7"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Niu, J., Sandhu, R.S., Winsborough, W.H.: Stale-safe security properties for group-based secure information sharing. In: FMSE 2008, pp. 53\u201362 (2008)","DOI":"10.1145\/1456396.1456402"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/69.567051","volume":"9","author":"E. Bertino","year":"1997","unstructured":"Bertino, E., Samarati, P., Jajodia, S.: An extended authorization model for relational databases. IEEE Trans. Knowl. Data Eng.\u00a09(1), 85\u2013101 (1997)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-28756-5_19","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Armando","year":"2012","unstructured":"Armando, A., Arsac, W., Avanesov, T., Barletta, M., Calvi, A., Cappai, A., Carbone, R., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Erzse, G., Frau, S., Minea, M., M\u00f6dersheim, S., von Oheimb, D., Pellegrino, G., Ponta, S.E., Rocchetto, M., Rusinowitch, M., Torabi Dashti, M., Turuani, M., Vigan\u00f2, L.: The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures. In: Flanagan, C., K\u00f6nig, B. (eds.) TACAS 2012. LNCS, vol.\u00a07214, pp. 267\u2013282. Springer, Heidelberg (2012)"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/320473.320482","volume":"1","author":"P. Griffiths","year":"1976","unstructured":"Griffiths, P., Wade, B.: An authorization mechanism for a relational database system. ACM Trans. Database Syst.\u00a01(3), 242\u2013255 (1976)","journal-title":"ACM Trans. Database Syst."},{"key":"7_CR14","unstructured":"Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW 2001, p. 174. IEEE CS (2001)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Chaudhuri, A., Naldurg, P., Rajamani, S., Ramalingam, G., Velaga, L.: EON: modeling and analyzing dynamic access control systems with logic programs. In: ACM CCS 2008, pp. 381\u2013390. ACM (2008)","DOI":"10.1145\/1455770.1455818"},{"key":"7_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1007\/11814771_51","volume-title":"Automated Reasoning","author":"D. Dougherty","year":"2006","unstructured":"Dougherty, D., Fisler, K., Krishnamurthi, S.: Specifying and reasoning about dynamic access-control policies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), vol.\u00a04130, pp. 632\u2013646. Springer, Heidelberg (2006)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-22444-7_14","volume-title":"Security and Trust Management","author":"D. Garg","year":"2011","unstructured":"Garg, D., Pfenning, F.: Stateful authorization logic: In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 210\u2013225. Springer, Heidelberg (2011)"},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/1187441.1187442","volume":"9","author":"N. Li","year":"2006","unstructured":"Li, N., Tripunitara, M.V.: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur.\u00a09(4), 391\u2013420 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Becker, M., Nanz, S.: A logic for state-modifying authorization policies. ACM Trans. Inf. Syst. Secur.\u00a013(3) (2010)","DOI":"10.1145\/1805974.1805976"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Becker, M.Y.: Specification and analysis of dynamic authorisation policies. In: CSF, pp. 203\u2013217. IEEE Computer Society (2009)","DOI":"10.1109\/CSF.2009.14"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-24725-8_23","volume-title":"Programming Languages and Systems","author":"J.D. Guttman","year":"2004","unstructured":"Guttman, J.D., Thayer, F.J., Carlson, J.A., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Trust management in strand spaces: A rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 325\u2013339. Springer, Heidelberg (2004)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A., Maffeis, S.: A type discipline for authorization policies. ACM Trans. Program. Lang. Syst. 29(5) (2007)","DOI":"10.1145\/1275497.1275500"},{"issue":"2","key":"7_CR23","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s11761-010-0073-4","volume":"5","author":"M. Barletta","year":"2011","unstructured":"Barletta, M., Ranise, S., Vigan\u00f2, L.: A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures. Service Oriented Computing and Applications\u00a05(2), 105\u2013137 (2011)","journal-title":"Service Oriented Computing and Applications"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis (2012); to appear in CSF 2012","DOI":"10.1109\/CSF.2012.27"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38004-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T09:34:13Z","timestamp":1557653653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38004-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380037","9783642380044"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38004-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}