{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:03:09Z","timestamp":1725552189919},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_1","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"1-20","source":"Crossref","is-referenced-by-count":2,"title":["Authorization and Trust Enhanced Security for Distributed Applications"],"prefix":"10.1007","author":[{"given":"Vijay","family":"Varadharajan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"SSL and TLS: Designing and Building Secure Systems","author":"E. Rescorla","year":"2001","unstructured":"Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison Wesley, Reading (2001)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security architecture for the Internet Protocol, RFC 2401 (1998), http:\/\/www.ietf.org\/rfc\/rfc2401.txt","DOI":"10.17487\/rfc2401"},{"key":"1_CR3","unstructured":"World Wide Web Consortium, XML-Signature Syntax and Processing XML Encryption Syntax and Processing \/TR\/xmlenc-core (2002), http:\/\/www.w3.org\/TR\/xmldsig-core\/ , http:\/\/www.w3.org\/TR\/xmldsig-core\/"},{"key":"1_CR4","unstructured":"World Wide Web Consortium, SOAP v1.2 Web Services Description Language (WSDL) v1.1 (2002), http:\/\/www.w3.org\/TR\/soap12-part1\/ , http:\/\/www.w3.org\/TR\/soap12-part1\/"},{"key":"1_CR5","unstructured":"Ash, D., Dillaway, B., Eastlake, D., Elley, Y., Epstein, J., Farrell, S., et al.: XML Key Management Specification, XKMS 2.0 (2004 April 05), http:\/\/www.w3.org\/TR\/xkms2\/"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: Proceedings of the IEEE Symposium on Security and Privacy, USA (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"1_CR7","unstructured":"Bai, Y., Varadharajan, V.: A Logic for State Transformations in Authorization Policies. In: Proceedings of the IEEE Computer Security Foundations Workshop, USA (1997)"},{"key":"1_CR8","unstructured":"Varadharajan, V., Crall, C., Pato, J.: Authorization for Enterprise wide Distributed Systems. In: Proceedings of the IEEE Computer Security Applications Conference, ACSAC 1998, USA (1998)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Proceedings of International Workshop on Policies for Distributed Systems and Networks, UK, pp. 18\u201338 (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Hitchens, M., Varadharajan, V.: Tower: A Language for Role Based Access Control. In: Proceedings of International Workshop on Policies for Distributed Systems and Networks, UK, pp. 88\u2013106 (2001)","DOI":"10.1007\/3-540-44569-2_6"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Indrakanti, S., Varadharajan, V., Hitchens, M., Kumar, R.: Secure Authorization for Web Services. In: Proceedings of the 17th IFIP Conference on Data and Applications Security, USA (2003)","DOI":"10.1007\/1-4020-8070-0_12"},{"issue":"2","key":"1_CR12","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., et al.: Role based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Varadharajan, V., Allen, P., Black, S.: An Analysis of the Proxy Problem in Distributed Systems. In: Proceedings of the IEEE Symposium on Security and Privacy, USA (1991)","DOI":"10.1109\/RISP.1991.130793"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Brewer, D., Nash, M.: The Chinese Wall Security Policy. In: Proceedings of the IEEE Symposium on Security and Privacy, USA, pp. 206\u2013214 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Varadharajan, V., Allen, P.: Joint Action based Authorization Schemes. ACM Operating Systems Review Journal\u00a030(3), 32\u201345","DOI":"10.1145\/230908.230915"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Varadharajan, V.: \u201cDistributed Authorization: Principles and Applications\u201d, Book Chapter, Coding, Cryptography. Singapore University Press (2001)","DOI":"10.1142\/9789812388841_0010"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Hitchens, M., Varadharajan, V.: Design and Specification of Role based Access Control Policies. In: IEE Proceedings \u2013 Software, UK (August 2000)","DOI":"10.1049\/ip-sen:20000792"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Indrakanti, S., Varadharajan, V., Hitchens, M.: Authorization Service for Web Services and its Application in a Healthcare Domain. accepted for publication in the International Journal for Web Services Research, Idea Group Publishing (March 2005)","DOI":"10.4018\/jwsr.2005100105"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Indrakanti, S., Varadharajan, V.: An Authorization Architecture for Web Services. In: Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, USA (2005)","DOI":"10.1007\/11535706_17"},{"key":"1_CR20","unstructured":"Microsoft Corporation, NET Framework (2005), http:\/\/msdn.microsoft.com\/netframework\/"},{"key":"1_CR21","unstructured":"Dept of Defense, Trusted Computer System Evaluation Criteria (TCSEC), DoD5200.28 STD (December 1985)"},{"key":"1_CR22","unstructured":"TCPA, \u201cTrusted Computing Platform Alliance\u201d, Building a Foundation of Trust in the PC (now known as Trusted Computing Group ) (January 2000), http:\/\/www.trustedcomputing.org , http:\/\/www.trustedcomputing.org"},{"key":"1_CR23","volume-title":"Trusted Computing Platforms: TCPA Technology in Context","author":"B. Balacheff","year":"2003","unstructured":"Balacheff, B., et al.: Trusted Computing Platforms: TCPA Technology in Context. Prentice-Hall, Englewood Cliffs (2003)"},{"key":"1_CR24","unstructured":"Varadharajan, V.: Trust Enhanced Authorization and its Application. Preparation (2005)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Zhao, W., Varadharajan, V., Bryan, G.: \u201cModelling Trust Relationships in Distributed Environments. In: International Conference on Trust and Privacy in Digital Business, TrustBus04 (in conjunction with DEXA2004), Spain (2004)","DOI":"10.1007\/978-3-540-30079-3_5"},{"key":"1_CR26","unstructured":"Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust Enhanced Security for Mobile Agents. In: 2005 IEEE International Conference on E-commerce Technology (IEEE CEC 2005), Germany, pp. 231\u2013238 (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:51Z","timestamp":1605643371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11593980_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}