{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:24:41Z","timestamp":1743117881465,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540367963"},{"type":"electronic","value":"9783540367994"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11805588_18","type":"book-chapter","created":{"date-parts":[[2006,7,18]],"date-time":"2006-07-18T06:53:12Z","timestamp":1153205592000},"page":"252-266","source":"Crossref","is-referenced-by-count":6,"title":["A Framework for Flexible Access Control in Digital Library Systems"],"prefix":"10.1007","author":[{"given":"Indrajit","family":"Ray","sequence":"first","affiliation":[]},{"given":"Sudip","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E., Perego, A.: Max: An access control system for digital libraries and the web. In: Proceedings of the 26th IEEE International Computer Software and Applications Conference, Oxford, UK (2002)","DOI":"10.1109\/CMPSAC.2002.1045127"},{"issue":"2","key":"18_CR2","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1145\/248625.248652","volume":"15","author":"H.M. Gladney","year":"1997","unstructured":"Gladney, H.M.: Access Control for Large Collections. ACM Transactions on Information Systems\u00a015(2), 154\u2013194 (1997)","journal-title":"ACM Transactions on Information Systems"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidia, J.: The KeyNote Trust Management System Version 2. Internet Society, Network Working Group. RFC\u00a02704 (1999)","DOI":"10.17487\/rfc2704"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.: Datalog with Constraints: A Foundation for Trust-management Languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Winslett, M., Ching, N., Jones, V., Slepchin, I.: Assuring security and privacy for digital library transactions on the Web: client and server security policies. In: Proceedings of the IEEE International Forum on Research and Technology Advances in Digital Libraries, Washington, DC, USA, pp. 140\u2013151 (1997)","DOI":"10.1109\/ADL.1997.601210"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Skogsrud, H., Benatallah, B., Casati, F.: A Trust Negotiation System for Digital Library Web Services. Journal of Digital Libraries, Special Issue on Security\u00a04(3) (2004)","DOI":"10.1007\/s00799-004-0083-y"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.: Adaptive Trust Negotiation and Access Control. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden (2005)","DOI":"10.1145\/1063979.1064004"},{"issue":"2","key":"18_CR9","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/69.991718","volume":"14","author":"N.R. Adam","year":"2002","unstructured":"Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: A Content-Based Authorization Model for Digital Libraries. IEEE Transactions on Knowledge and Data Engineering\u00a014(2), 296\u2013315 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"18_CR10","first-page":"134","volume-title":"Proceedings of the 7th ACM Conference on Computer and Communication Security","author":"P. Bonatti","year":"2000","unstructured":"Bonatti, P., Samarati, P.: Regulating Service Access and Information Release on the Web. In: Proceedings of the 7th ACM Conference on Computer and Communication Security, Athens, Greece, pp. 134\u2013143. ACM Press, New York (2000)"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-540-30108-0_16","volume-title":"Computer Security \u2013 ESORICS 2004","author":"I. Ray","year":"2004","unstructured":"Ray, I., Chakraborty, S.: A Vector Model of Trust for Developing Trustworthy Systems. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 260\u2013275. Springer, Heidelberg (2004)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11593980_7","volume-title":"Information Systems Security","author":"I. Ray","year":"2005","unstructured":"Ray, I., Chakraborty, S., Ray, I.: VTrust: A Trust Management System Based on a Vector Model of Trust. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol.\u00a03803, pp. 91\u2013105. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11805588_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T23:14:59Z","timestamp":1555715699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11805588_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540367963","9783540367994"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11805588_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}