{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:55:13Z","timestamp":1725573313861},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540352259"},{"type":"electronic","value":"9783540352266"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11775300_17","type":"book-chapter","created":{"date-parts":[[2006,6,14]],"date-time":"2006-06-14T07:51:04Z","timestamp":1150271464000},"page":"193-204","source":"Crossref","is-referenced-by-count":0,"title":["Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection"],"prefix":"10.1007","author":[{"given":"Zude","family":"Li","sequence":"first","affiliation":[]},{"given":"Guoqiang","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Lysyanskaya, A., Rivest, R.L., et al.: Pseudonym Systems, theory.lcs.mit.edu\/rivest\/LysyanskayaRivestSahaiWolf-PseudonymSystems.pdf"},{"key":"17_CR2","unstructured":"Anonymity, Unlinkability, Unovervability, Pseudonymity and Identity Management\u2013A Consolidated Proposal for Terminology, http:\/\/dud.inf.tu-dresden.de"},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/4236.978368","volume":"6","author":"I. Clarke","year":"2002","unstructured":"Clarke, I., et al.: Protecting Free Expression Online with Freenet. IEEE Internet Computing\u00a06(1), 40\u201349 (2002)","journal-title":"IEEE Internet Computing"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Daswani, N., Garcia-Molina, H., Yang, B.: Open Problems in Data-Sharing Peerto-Peer Systems. In: Proceedings of the 9th International Conference on Database Theory, Siena, Italy (2003)","DOI":"10.1007\/3-540-36285-1_1"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","first-page":"109","volume-title":"Security Protocols","author":"D. Cvr\u010dek","year":"2002","unstructured":"Cvr\u010dek, D., Maty\u00e1\u0161 Jr., V.: Pseudonymity in the light of evidence-based trust. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol.\u00a03957, pp. 109\u2013116. Springer, Heidelberg (2002)"},{"key":"17_CR6","unstructured":"Ferraiolo, D., Kuhn, R.: Role-Based Access Controls. In: Proceedings of the 15th National Computer Security Conference, vol.\u00a0II, pp. 554\u2013563 (1992)"},{"issue":"3","key":"17_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based AccessControl. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"17_CR8","unstructured":"Milojicic, D.S., Kalogeraki, V., Lukose, R., et al.: Peer-to-peer Computing. HP Laboratories, HPL-2002-57, March 8 (2002)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Druschel P., Rowstorn, A.: PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility, HotOS VIII, Schloss Elmau, Germany (May 2001)","DOI":"10.1145\/502051.502053"},{"key":"17_CR10","unstructured":"Graham, R.L.: Traditional and Non-Traditional Applications. Peer-to-Peer Networks. Lecture (2001), http:\/\/www.ida.liu.se\/TDTS43\/tdts43-10-peer-topeer.pdf"},{"key":"17_CR11","volume-title":"Security Architectures for Controlled Digital Information Dissemination","author":"J. Park","year":"2000","unstructured":"Park, J., Sandhu, R., Schifalacqua, J.: Security Architectures for Controlled Digital Information Dissemination. IEEE, Los Alamitos (2000)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Byun, J.-w., Bertino, E., Li, N.: Purpose-Based Access Control of Complex Data For Privacy Protection. In: SACMAT 2005, Sweden (June 2005)","DOI":"10.1145\/1063979.1063998"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Byun, J.-w., Bertino, E., Li, N.: Purpose-Based Access Control For Privacy Protection In Rrelational Database Systems, Technical Report 2004-52, Purdue University (2004)","DOI":"10.1145\/1063979.1063998"},{"key":"17_CR14","unstructured":"Peer-to-Peer Working Group (2001), http:\/\/www.p2pwg.org"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.: Towards Multi-dimensional Characterization of Dissemination Control. In: Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004 (2004)","DOI":"10.1109\/POLICY.2004.1309168"},{"key":"17_CR16","unstructured":"Lannella, R., Higgs, P.: Driving Content Management with Digital Rights Management. IPR systems whitepaper series (2003)"},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"Stephanos","year":"2004","unstructured":"Stephanos, Theotokis, D., Spinellis, D.: A Survey of Peer-to- Peer Content Distributioon technologies. ACM Computing Survey\u00a036(4), 335\u2013371 (2004)","journal-title":"ACM Computing Survey"},{"issue":"2","key":"17_CR18","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., et al.: Role-based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Gavrila, S.I., Barkley, J.F.: Formal Sepcification for Role Based Access Control User\/Role and Role\/Role Relationship Management. In: 3rd ACM Workshop on Role-Based Access Fairfax VA, pp. 81\u201391 (1998)","DOI":"10.1145\/286884.286902"},{"key":"17_CR20","unstructured":"The Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation, part 2, draft version 3 and version 2.1-2.3 (August 2005)"},{"key":"17_CR21","unstructured":"Todd Sundsted: A New-Fangled Name, but An Old and Useful Approach to Computing Level: Introductory (2001), http:\/\/www-128.ibm.com\/developerworks\/library\/j-p2p\/index.html"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Li, X., et al.: Access Control in Peer-to-Peer Collaborative Systems. In: Distributed Computing Systems Workshops, 25th IEEE International Conference, June 2005, pp. 835\u2013840 (2005)","DOI":"10.1109\/ICDCSW.2005.29"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11775300_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:52Z","timestamp":1619507692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11775300_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540352259","9783540352266"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11775300_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}