{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:06:35Z","timestamp":1761843995995},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11414360_22","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"225-238","source":"Crossref","is-referenced-by-count":30,"title":["TrustAC: Trust-Based Access Control for Pervasive Devices"],"prefix":"10.1007","author":[{"given":"Florina","family":"Almen\u00e1rez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andr\u00e9s","family":"Mar\u00edn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Celeste","family":"Campo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos","family":"Garc\u00eda R.","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Barkley, J.: Security in Open System. Technical report, National Institute of Standards and Technology(NIST)(1994)"},{"key":"22_CR2","unstructured":"Ferraiolo, D., Cugini, J., Jun, D.: Role based access control (RBAC). National Institute of Standards and Technology, NIST (1992), http:\/\/csrc.nist.gov\/rbac\/"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An internet attribute certificate profile for authorization, IETF RFC 3281 (2002), http:\/\/www.ietf.org\/rfc\/rfc3281.txt","DOI":"10.17487\/rfc3281"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Ellison, C.: SPKI Requirements. Technical Report RFC 2692, IETF Network Working Group (1999)","DOI":"10.17487\/rfc2692"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate theory. Technical Report RFC 2693, IETF Network Working Group (1999)","DOI":"10.17487\/rfc2693"},{"key":"22_CR6","unstructured":"Rivest, R., Lampson, B.: SDSI - a simple distributed security infrastructure. In: Presented at CRYPTO 1996 Rumpsession (1996)"},{"key":"22_CR7","unstructured":"Ellison, C.: SPKI\/SDSI certificates (2004), http:\/\/world.std.com\/cme\/html\/spki.html"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust management system. Internet Request for Comment RFC 2704, Internet Engineering Task Force, IETF (1999)","DOI":"10.17487\/rfc2704"},{"key":"22_CR9","unstructured":"OASIS: Security Assertion Markup Language (SAML), http:\/\/www.saml.org , http:\/\/www.oasis-open.org\/committees\/security (2002)"},{"key":"22_CR10","unstructured":"Almen\u00dfrez, F., Marfn, A., Campo, C., Garcfa, C.: PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In: First Workshop on Pervasive Security, Privacy and Trust PSPT 2004 in conjuntion with Mobiquitous 2004 (2004)"},{"key":"22_CR11","volume-title":"The Official PGP User\u2019s Guide.","author":"P. Zimmermann","year":"1995","unstructured":"Zimmermann, P.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"},{"key":"22_CR12","unstructured":"J\u00f8sang, A.: An algebra for assessing trust in certification chains. In: Network and Distributed Systems Security (NDSS 1999) Symposium, The Internet Society (1999)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Yavatkar, R., Pendarakis, D., Guerin, R.: A framework for policy-based admission control. Internet Request for Comment RFC 2753, Internet Engineering Task Force (IETF) (2000)","DOI":"10.17487\/rfc2753"},{"key":"22_CR14","unstructured":"Godik, S., Moses, T. (eds.): extensible access control markup language (XACML). OASIS eXtensible Access Control Markup Language TC (2003)"},{"key":"22_CR15","unstructured":"Proctor, S.: Sun\u2019s XACML implementation. Sun Microsystems Laboratories (2003), http:\/\/sunxacml.sourceforge.net\/"},{"key":"22_CR16","unstructured":"Anderson, A.: XACML profile for role based access control (RBAC), version 2.0 (2004), http:\/\/www.oasis-open.org\/committees\/download.php\/6806\/wd-xacml-rbac-profile-02.1.pdf"},{"key":"22_CR17","volume-title":"Annual Computer Security Applications Conference","author":"D. Ferraiolo","year":"1995","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, R.: Role based access control (RBAC): Features and motivations. In: Annual Computer Security Applications Conference. IEEE Computer Society Press, Los Alamitos (1995)"},{"key":"22_CR18","unstructured":"Curphey, M., Endler, D., Hau, W., Taylor, S., Smith, T., Russell, A., McKenna, G., Parke, R., McLaughlin, K.: A guide to building secure web applications. Technical report, The Open Web Application Security Project (2002)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11414360_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:51:39Z","timestamp":1605642699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11414360_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11414360_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}