{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:31:45Z","timestamp":1730316705955,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,26]]},"DOI":"10.1145\/2523514.2523569","type":"proceedings-article","created":{"date-parts":[[2014,1,7]],"date-time":"2014-01-07T14:49:20Z","timestamp":1389106160000},"page":"388-391","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel approach for dynamic authorisation planning in constrained workflow systems"],"prefix":"10.1145","author":[{"given":"Meriam","family":"Jemel","sequence":"first","affiliation":[{"name":"University of Tunis, Tunis, Tunisia"}]},{"given":"Nadia","family":"Ben Azzouna","sequence":"additional","affiliation":[{"name":"University of Tunis, Tunis, Tunisia"}]},{"given":"Khaled","family":"Ghedira","sequence":"additional","affiliation":[{"name":"University of Tunis, Tunis, Tunisia"}]}],"member":"320","published-online":{"date-parts":[[2013,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300837"},{"key":"e_1_3_2_1_2_1","volume-title":"Synthesizing and verifying plans for constrained workflows: Transferring tools from formal methods","author":"Crampton J.","year":"2011","unstructured":"J. Crampton and M. Huth . Synthesizing and verifying plans for constrained workflows: Transferring tools from formal methods , 2011 . J. Crampton and M. Huth. Synthesizing and verifying plans for constrained workflows: Transferring tools from formal methods, 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90046-3"},{"key":"e_1_3_2_1_4_1","first-page":"356","volume-title":"Proceedings of the 6th international joint conference on Artificial intelligence -","volume":"1","author":"Haralick R. M.","year":"1979","unstructured":"R. M. Haralick and G. L. Elliott . Increasing tree search efficiency for constraint satisfaction problems . In Proceedings of the 6th international joint conference on Artificial intelligence - Volume 1 , IJCAI'79, pages 356 -- 364 , San Francisco, CA, USA , 1979 . Morgan Kaufmann Publishers Inc. R. M. Haralick and G. L. Elliott. Increasing tree search efficiency for constraint satisfaction problems. In Proceedings of the 6th international joint conference on Artificial intelligence - Volume 1, IJCAI'79, pages 356--364, San Francisco, CA, USA, 1979. Morgan Kaufmann Publishers Inc."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063986"},{"key":"e_1_3_2_1_6_1","first-page":"25","volume-title":"Proceedings of the eighth National Conference on Artificial Intelligence, AAAI'90","author":"Mittal S.","year":"1990","unstructured":"S. Mittal and B. Falkenhainer . Dynamic constraint satisfaction problems . In Proceedings of the eighth National Conference on Artificial Intelligence, AAAI'90 , pages 25 -- 32 . AAAI Press , 1990 . S. Mittal and B. Falkenhainer. Dynamic constraint satisfaction problems. In Proceedings of the eighth National Conference on Artificial Intelligence, AAAI'90, pages 25--32. AAAI Press, 1990."},{"key":"e_1_3_2_1_7_1","volume-title":"CP01 Workshop on User-Interaction in Constarint Satisfaction","author":"Narenda J.","year":"2001","unstructured":"J. Narenda . e-constraint : explanation-based constraint programming . In CP01 Workshop on User-Interaction in Constarint Satisfaction , 2001 . J. Narenda. e-constraint: explanation-based constraint programming. In CP01 Workshop on User-Interaction in Constarint Satisfaction, 2001."},{"key":"e_1_3_2_1_8_1","first-page":"284","volume-title":"in Proc. of the 11th IJCAI","author":"Rivin I.","year":"1989","unstructured":"I. Rivin and R. Zabih . An algebraic approach to constraint satisfaction problems . In in Proc. of the 11th IJCAI , pages 284 -- 289 . Bliek , 1989 . I. Rivin and R. Zabih. An algebraic approach to constraint satisfaction problems. In in Proc. of the 11th IJCAI, pages 284--289. Bliek, 1989."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009674"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880034"}],"event":{"name":"SIN '13: The 6th International Conference on Security of Information and Networks","sponsor":["Macquarie U., Austarlia","MNIT Malaviya National Institute of Technology","Aksaray Univ. Aksaray University","SFedU Southern Federal University","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Aksaray Turkey","acronym":"SIN '13"},"container-title":["Proceedings of the 6th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523514.2523569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T09:45:04Z","timestamp":1673689504000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523514.2523569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,26]]},"references-count":10,"alternative-id":["10.1145\/2523514.2523569","10.1145\/2523514"],"URL":"https:\/\/doi.org\/10.1145\/2523514.2523569","relation":{},"subject":[],"published":{"date-parts":[[2013,11,26]]},"assertion":[{"value":"2013-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}