{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:47:39Z","timestamp":1729637259160,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icccn.2011.6005897","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T19:33:30Z","timestamp":1315856010000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Knowledge-Based Policy Conflict Analysis in Mobile Social Networks"],"prefix":"10.1109","author":[{"given":"Zhengping","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuanyao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090302"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.18"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1178618.1178620"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/359496.359500"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/349194.349197"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235347"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jal.2005.12.011"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.05.006"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.14"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/800227.806869"},{"key":"4","article-title":"Temporal Logic","author":"zalta","year":"2008","journal-title":"The Stanford Encyclopedia of Philosophy"},{"key":"9","doi-asserted-by":"crossref","first-page":"327","DOI":"10.3233\/JCS-2006-14402","article-title":"Language based policy analysis in a SPKI Trust Management System","volume":"14","author":"eamani","year":"2006","journal-title":"Journal of Computer Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.464"}],"event":{"name":"2011 20th International Conference on Computer Communications and Networks - ICCCN 2011","start":{"date-parts":[[2011,7,31]]},"location":"Lahaina, HI, USA","end":{"date-parts":[[2011,8,4]]}},"container-title":["2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6005186\/6005707\/06005897.pdf?arnumber=6005897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T11:32:28Z","timestamp":1560598348000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6005897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icccn.2011.6005897","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}