{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:48:02Z","timestamp":1725544082148},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540345442"},{"type":"electronic","value":"9783540345459"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11762256_51","type":"book-chapter","created":{"date-parts":[[2006,5,31]],"date-time":"2006-05-31T19:29:40Z","timestamp":1149103780000},"page":"712-724","source":"Crossref","is-referenced-by-count":31,"title":["Semantic Web Policies \u2013 A Discussion of Requirements and Research Issues"],"prefix":"10.1007","author":[{"given":"P. A.","family":"Bonatti","sequence":"first","affiliation":[]},{"given":"C.","family":"Duma","sequence":"additional","affiliation":[]},{"given":"N.","family":"Fuchs","sequence":"additional","affiliation":[]},{"given":"W.","family":"Nejdl","sequence":"additional","affiliation":[]},{"given":"D.","family":"Olmedilla","sequence":"additional","affiliation":[]},{"given":"J.","family":"Peer","sequence":"additional","affiliation":[]},{"given":"N.","family":"Shahmehri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown Heights (June 2004)","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"51_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Strauss, M.: Compliance Checking in the PolicyMaker Trust Management System. In: Financial Cryptography, British West Indies (February 1998)","DOI":"10.1007\/BFb0055488"},{"key":"51_CR3","unstructured":"Bonatti, P.A., Shahmehri, N., Duma, C., Olmedilla, D., Nejdl, W., Baldoni, M., Baroglio, C., Martelli, A., Patti, V., Coraggio, P., Antoniou, G., Peer, J., Fuchs, N.E.: Rule-based policy specification: State of the art and future work. Technical report, Working Group I2, EU NoE REWERSE (August 2004), http:\/\/rewerse.net\/deliverables\/i2-d1.pdf"},{"key":"51_CR4","unstructured":"Bonatti, P.A., Olmedilla, D., Peer, J.: Advanced policy queries. Technical Report I2-D4, Working Group I2, EU NoE REWERSE (August 2005), http:\/\/www.rewerse.net"},{"issue":"3","key":"51_CR5","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P.A. Bonatti","year":"2002","unstructured":"Bonatti, P.A., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security\u00a010(3), 241\u2013272 (2002); Short version in the Proc. of the Conference on Computer and Communications Security (CCS 2000), Athens (2000)","journal-title":"Journal of Computer Security"},{"key":"51_CR6","unstructured":"Bonatti, P.A., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy-based trust management. In: Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland (November 2005)"},{"key":"51_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/POLICY.2005.13","volume-title":"6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005)","author":"P.A. Bonatti","year":"2005","unstructured":"Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden, June 2005, pp. 14\u201323. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"51_CR8","unstructured":"da Silva, P.P., McGuinness, D.L., Fikes, R.: A proof markup language for semantic web services. Technical Report KSL Tech Report KSL-04-01 (January 2004)"},{"key":"51_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-25956-5_24","volume-title":"The Semantic Web: Research and Applications","author":"R. Gavriloaie","year":"2004","unstructured":"Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K.E., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol.\u00a03053, pp. 342\u2013356. Springer, Heidelberg (2004)"},{"key":"51_CR10","unstructured":"Kolovski, V., Katz, Y., Hendler, J., Weitzner, D., Berners-Lee, T.: Towards a policy-aware web. In: Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland (November 2005)"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., Winsborough, W., Mitchell, J.C.: Distributed Credential Chain Discovery in Trust Management (Extended Abstract). In: ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania (November 2001)","DOI":"10.1145\/502001.502005"},{"issue":"4","key":"51_CR12","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.websem.2004.06.002","volume":"1","author":"D.L. McGuinness","year":"2004","unstructured":"McGuinness, D.L., da Silva, P.P.: Explaining answers from the semantic web: The inference web approach. Journal of Web Semantics\u00a01(4), 397\u2013413 (2004)","journal-title":"Journal of Web Semantics"},{"key":"51_CR13","unstructured":"McGuinness, D.L., da Silva, P.P.: Trusting answers from web applications. In: New Directions in Question Answering, pp. 275\u2013286 (2004)"},{"key":"51_CR14","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1145\/1007568.1007724","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"A. Rosenthal","year":"2004","unstructured":"Rosenthal, A., Winslett, M.: Security of shared data in large systems: State of the art and research directions. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, pp. 962\u2013964. ACM Press, New York (2004)"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Seamons, K., Winslett, M., Yu, T., Smith, B., Child, E., Jacobsen, J., Mills, H., Yu, L.: Requirements for Policy Languages for Trust Negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, CA (June 2002)","DOI":"10.1109\/POLICY.2002.1011295"},{"issue":"5","key":"51_CR16","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MIS.2004.52","volume":"19","author":"S. Staab","year":"2004","unstructured":"Staab, S., Bhargava, B.K., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T.S., Chang, E., Hussain, F.K., Nejdl, W., Olmedilla, D., Kashyap, V.: The pudding of trust. IEEE Intelligent Systems\u00a019(5), 74\u201388 (2004)","journal-title":"IEEE Intelligent Systems"},{"key":"51_CR17","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3487.001.0001","volume-title":"Heterogenous Active Agents","author":"V.S. Subrahmanian","year":"2000","unstructured":"Subrahmanian, V.S., Bonatti, P.A., Dix, J., Eiter, T., Kraus, S., Ozcan, F., Ross, R.: Heterogenous Active Agents. MIT Press, Cambridge (2000)"},{"key":"51_CR18","unstructured":"Subrahmanian, V.S., Adali, S., Brink, A., Emery, R., Lu, J.J., Rajput, A., Rogers, T.J., Ross, R., Ward, C.: Hermes: Heterogeneous reasoning and mediator system, http:\/\/www.cs.umd.edu\/projects\/publications\/abstracts\/hermes.html"},{"issue":"3","key":"51_CR19","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/64.87686","volume":"6","author":"W. Swartout","year":"1991","unstructured":"Swartout, W., Paris, C., Moore, J.: Explanations in knowledge systems: Design for explainable expert systems. IEEE Expert: Intelligent Systems and Their Applications\u00a06(3), 58\u201364 (1991)","journal-title":"IEEE Expert: Intelligent Systems and Their Applications"},{"issue":"3","key":"51_CR20","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/64.87685","volume":"6","author":"M.C. Tanner","year":"1991","unstructured":"Tanner, M.C., Keuneke, A.M.: Explanations in knowledge systems: The roles of the task structure and domain functional models. IEEE Expert: Intelligent Systems and Their Applications\u00a06(3), 50\u201357 (1991)","journal-title":"IEEE Expert: Intelligent Systems and Their Applications"},{"key":"51_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1007\/978-3-642-77927-5_26","volume-title":"Second Generation Expert Systems","author":"M.R. Wick","year":"1993","unstructured":"Wick, M.R.: Second generation expert system explanation. In: David, J.-M., Krivine, J.-P., Simmons, R. (eds.) Second Generation Expert Systems. LNCS, pp. 614\u2013640. Springer, Heidelberg (1993)"},{"key":"51_CR22","unstructured":"Winsborough, W., Seamons, K., Jones, V.: Negotiating Disclosure of Sensitive Credentials. In: Second Conference on Security in Communication Networks, Amalfi, Italy (September 1999)"},{"key":"51_CR23","unstructured":"Winsborough, W., Seamons, K., Jones, V.: Automated Trust Negotiation. In: DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC (January 2000)"},{"issue":"6","key":"51_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M. Winslett","year":"2002","unstructured":"Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust on the web. IEEE Internet Computing\u00a06(6), 30\u201337 (2002)","journal-title":"IEEE Internet Computing"},{"issue":"1","key":"51_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur.\u00a06(1), 1\u201342 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"51_CR26","volume-title":"12th ACM Conference on Computer and Communication Security (CCS 2005)","author":"C. Zhang","year":"2005","unstructured":"Zhang, C., Bonatti, P.A., Winslett, M.: Peeraccess: A logic for distributed authorization. In: 12th ACM Conference on Computer and Communication Security (CCS 2005), Alexandria, VA, USA. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web: Research and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11762256_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:05:43Z","timestamp":1605643543000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11762256_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540345442","9783540345459"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11762256_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}