{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:45Z","timestamp":1725549345202},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_4","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"19-23","source":"Crossref","is-referenced-by-count":0,"title":["Towards Flexible Credential Negotiation Protocols"],"prefix":"10.1007","author":[{"given":"Piero A.","family":"Bonatti","sequence":"first","affiliation":[]},{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Altenschmidt, C., Biskup, J., Flegel, U., Karabulut, Y.: Secure Mediation: Requirements and Design. In: Proc. of the 12th IFIP WG11.3 Working Conference on Database and Application Security, Chalkidiki, Greece (July 1998)"},{"key":"4_CR2","series-title":"LNCS State-of-the-Art series","volume-title":"Secure Internet Programming: Issues in Distributed and Mobile Object Systems","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In: Secure Internet Programming: Issues in Distributed and Mobile Object Systems. LNCS State-of-the-Art series. Springer, Heidelberg (1998)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"4_CR4","volume-title":"Proc. of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security","author":"J. Biskup","year":"2002","unstructured":"Biskup, J., Karabulut, Y.: A Hybrid PKI Model with an Application for Secure Mediation. In: Proc. of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, July 2002, King\u2019s College, Cambridge (2002)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Samarati, P.: A Unified Framework for Regulating Access and Information Release on the Web. Journal of Computer Security (2002) (to appear)","DOI":"10.3233\/JCS-2002-10303"},{"issue":"3","key":"4_CR6","first-page":"706","volume":"2","author":"Y.-H. Chu","year":"1997","unstructured":"Chu, Y.-H.: Joan Feigenbaum, B.\u00a0LaMacchia, P.\u00a0Resnick, and M.\u00a0Strauss. REFEREE: trust management for Web applications. World Wide Web Journal\u00a02(3), 706\u2013734 (1997)","journal-title":"World Wide Web Journal"},{"issue":"2","key":"4_CR7","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/304181.304212","volume":"28","author":"Chen-Chuan K. Chang","year":"1999","unstructured":"Chang, C.-C.K., Garcia-Molina, H.: Mind Your Vocabulary: Query Mapping Across Heterogeneous Information Sources. In: Proc. of the 1999 ACM-SIGMOD, pp. 335\u2013346 (1999)","journal-title":"ACM SIGMOD Record"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile, 2459th edn. (January 1999), http:\/\/www.ietf.org\/rfc\/rfc2459.txt","DOI":"10.17487\/rfc2459"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible Support for Multiple Access Control Policies. ACM Transactions on Database Systems\u00a026(2), 18\u201328 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed Credential Chain Discovery in Trust Management. In: Proc. of the Eighth ACM Conference on Computer and Communications Security, Philadelphia, PA, USA (2001)","DOI":"10.1145\/501983.502005"},{"key":"4_CR11","unstructured":"Seamons, K.E., Winsborough, W., Winslett, M.: Internet Credential Acceptance Policies. In: Proceedings of the Workshop on Logic Programming for Internet Applications, Leuven, Belgium (July 1997)"},{"key":"4_CR12","unstructured":"Winslett, M., Ching, N., Jones, V., Slepchin, I.: Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies. In: Proceedings of ADL 1997 \u2014 Forum on Research and Tech. Advances in Digital Libraries, Washington, DC (May 1997)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Winslett, M., Ching, N., Jones, V., Slepchin, I.: Using Digital Credentials on the World-Wide Web. In: Journal of Computer Security (1997)","DOI":"10.3233\/JCS-1997-5307"},{"key":"4_CR14","volume-title":"Proc. of the DARPA Information Survivability Conf. & Exposition","author":"W. Winsborough","year":"2000","unstructured":"Winsborough, W., Seamons, K.E., Jones, V.: Automated Trust Negotiation. In: Proc. of the DARPA Information Survivability Conf. & Exposition, Hilton Head Island, January 25-27. IEEE-CS, Los Alamitos (2000)"},{"key":"4_CR15","unstructured":"Yu, T., Ma, X., Winslett, M.: An Efficient Complete Strategy for Automated Trust Negotiation over the Internet. In: Proceedings of 7th ACM Computer and Communication Security, Athens, Greece (November 2000)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Interoperable Strategies in Automated Trust Negotiation. In: Proc. of the Eighth ACM Conference on Computer and Communications Security, Philadelphia, PA, USA (2001)","DOI":"10.1145\/501983.502004"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T22:29:28Z","timestamp":1586471368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11542322_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}