{"id":"https://openalex.org/W1993509560","doi":"https://doi.org/10.1177/0037549706068828","title":"Simulation Verification and Validation by Dynamic Policy Specification and Enforcement","display_name":"Simulation Verification and Validation by Dynamic Policy Specification and Enforcement","publication_year":2006,"publication_date":"2006-05-01","ids":{"openalex":"https://openalex.org/W1993509560","doi":"https://doi.org/10.1177/0037549706068828","mag":"1993509560"},"language":"en","primary_location":{"id":"doi:10.1177/0037549706068828","is_oa":false,"landing_page_url":"https://doi.org/10.1177/0037549706068828","pdf_url":null,"source":{"id":"https://openalex.org/S32573412","display_name":"SIMULATION","issn_l":"0037-5497","issn":["0037-5497","1741-3133"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIMULATION","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063411746","display_name":"Wei\u2010Tek Tsai","orcid":"https://orcid.org/0000-0002-4049-3706"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"W. T. Tsai","raw_affiliation_strings":["Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034774132","display_name":"Yinong Chen","orcid":"https://orcid.org/0000-0002-8780-3994"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yinong Chen","raw_affiliation_strings":["Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281,","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108521896","display_name":"Ray Paul","orcid":null},"institutions":[{"id":"https://openalex.org/I1330347796","display_name":"United States Department of Defense","ror":"https://ror.org/0447fe631","country_code":"US","type":"government","lineage":["https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ray Paul","raw_affiliation_strings":["Department of Defense Washington, DC"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Defense Washington, DC","institution_ids":["https://openalex.org/I1330347796"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029571874","display_name":"Xinyu Zhou","orcid":"https://orcid.org/0000-0003-1399-828X"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinyu Zhou","raw_affiliation_strings":["Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109121586","display_name":"Chun Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chun Fan","raw_affiliation_strings":["Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department Arizona State University                         Tempe, AZ 85281","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5034774132"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":5.3244,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.95149987,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"82","issue":"5","first_page":"295","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.8535968065261841},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7776438593864441},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.7695862650871277},{"id":"https://openalex.org/keywords/specification-language","display_name":"Specification language","score":0.6689683198928833},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6501933336257935},{"id":"https://openalex.org/keywords/completeness","display_name":"Completeness (order theory)","score":0.6128150820732117},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5390057563781738},{"id":"https://openalex.org/keywords/system-requirements-specification","display_name":"System requirements specification","score":0.4425390958786011},{"id":"https://openalex.org/keywords/specification","display_name":"Specification","score":0.43518853187561035},{"id":"https://openalex.org/keywords/formal-specification","display_name":"Formal specification","score":0.412562757730484},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.36917516589164734},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.34599557518959045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.213272362947464}],"concepts":[{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.8535968065261841},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7776438593864441},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.7695862650871277},{"id":"https://openalex.org/C201677973","wikidata":"https://www.wikidata.org/wiki/Q1209840","display_name":"Specification language","level":2,"score":0.6689683198928833},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6501933336257935},{"id":"https://openalex.org/C17231256","wikidata":"https://www.wikidata.org/wiki/Q5156540","display_name":"Completeness (order theory)","level":2,"score":0.6128150820732117},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5390057563781738},{"id":"https://openalex.org/C84651959","wikidata":"https://www.wikidata.org/wiki/Q17052506","display_name":"System requirements specification","level":2,"score":0.4425390958786011},{"id":"https://openalex.org/C117222624","wikidata":"https://www.wikidata.org/wiki/Q7575010","display_name":"Specification","level":2,"score":0.43518853187561035},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.412562757730484},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.36917516589164734},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34599557518959045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.213272362947464},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/0037549706068828","is_oa":false,"landing_page_url":"https://doi.org/10.1177/0037549706068828","pdf_url":null,"source":{"id":"https://openalex.org/S32573412","display_name":"SIMULATION","issn_l":"0037-5497","issn":["0037-5497","1741-3133"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIMULATION","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1484492367","https://openalex.org/W1536095764","https://openalex.org/W1542094804","https://openalex.org/W1558396271","https://openalex.org/W1640327256","https://openalex.org/W1791702618","https://openalex.org/W1991895580","https://openalex.org/W2010890892","https://openalex.org/W2049009791","https://openalex.org/W2098629476","https://openalex.org/W2104898295","https://openalex.org/W2129624816","https://openalex.org/W2130937534","https://openalex.org/W2137135845","https://openalex.org/W2138742779","https://openalex.org/W2139708750","https://openalex.org/W2148952798","https://openalex.org/W2150306925","https://openalex.org/W2157157653","https://openalex.org/W2165400523","https://openalex.org/W2166602595","https://openalex.org/W2168884369","https://openalex.org/W2182719060","https://openalex.org/W2340735175","https://openalex.org/W2363490788","https://openalex.org/W2970576388","https://openalex.org/W4210492122","https://openalex.org/W4210521451","https://openalex.org/W4239578735","https://openalex.org/W4246424747","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2558572842","https://openalex.org/W2047524021","https://openalex.org/W1547699668","https://openalex.org/W2158159493","https://openalex.org/W2136463869","https://openalex.org/W2164362143","https://openalex.org/W2211523418","https://openalex.org/W2125701012","https://openalex.org/W2086075944","https://openalex.org/W1523195236"],"abstract_inverted_index":{"This":[0,64],"article":[1,65,125,135],"presents":[2,67],"a":[3,55],"new":[4],"verification":[5],"and":[6,15,22,30,72,87,97,107,131,142,145],"validation":[7],"technique":[8],"for":[9],"simulation":[10,45,117],"using":[11],"dynamic":[12],"policy":[13,52,69,74,104,109,129,140],"specification":[14,70,105,130],"enforcement.":[16],"Security":[17],"requirements,":[18,21],"certain":[19],"functional":[20],"constraints":[23],"can":[24],"be":[25],"formally":[26],"specified":[27],"as":[28],"policies,":[29,82,90],"they":[31],"are":[32,46,78,112],"used":[33,79,122],"to":[34,80,83,91,98,126],"check":[35],"at":[36,101],"runtime":[37],"whether":[38],"the":[39,42,48,60,68,73,108,116,124,128],"behaviors":[40],"of":[41,59,89,139],"system":[43,61],"under":[44,62],"within":[47],"given":[49],"constraints.":[50],"A":[51],"violation":[53],"reveals":[54],"potential":[56],"design":[57],"error":[58],"simulation.":[63],"also":[66],"language":[71,106],"development":[75,110],"framework":[76,111],"that":[77],"specify":[81],"verify":[84],"their":[85,143],"completeness":[86],"consistency":[88],"translate":[92],"them":[93,100],"into":[94,115],"executable":[95],"representations,":[96],"enforce":[99],"runtime.":[102],"The":[103,134],"fully":[113],"integrated":[114],"infrastructure.":[118],"An":[119],"example":[120],"is":[121],"throughout":[123],"illustrate":[127],"enforcement":[132,141],"processes.":[133],"discusses":[136],"different":[137],"algorithms":[138],"space":[144],"time":[146],"complexity.":[147]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2026-05-05T06:06:40.768181","created_date":"2025-10-10T00:00:00"}
