{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:29:44Z","timestamp":1778300984130,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540494966","type":"print"},{"value":"9783540494973","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_12","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"159-173","source":"Crossref","is-referenced-by-count":9,"title":["Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)"],"prefix":"10.1007","author":[{"given":"Ziqing","family":"Mao","sequence":"first","affiliation":[]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Winsborough","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/SECPRI.1996.502679","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/3-540-63141-0_10","volume-title":"Proceedings of CONCUR\u201997","author":"A. Bouajjani","year":"1997","unstructured":"Bouajjani, A., Esparza, J., Maler, O.: Reachability analysis of pushdown automata: Application to model-checking. In: CONCUR 1997. LNCS, vol.\u00a01256, pp. 135\u2013150. Springer, Heidelberg (1997)"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/227595.227597","volume":"43","author":"W. Chen","year":"1996","unstructured":"Chen, W., Warren, D.S.: Tabled evaluation with delaying for general logic programs. Journal of the ACM\u00a043(1), 20\u201374 (1996)","journal-title":"Journal of the ACM"},{"issue":"4","key":"12_CR4","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D. Clarke","year":"2001","unstructured":"Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI\/SDSI. Journal of Computer Security\u00a09(4), 285\u2013322 (2001)","journal-title":"Journal of Computer Security"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. IETF RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"issue":"15","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1002\/1097-024X(200012)30:15<1609::AID-SPE334>3.0.CO;2-5","volume":"30","author":"C.A. Gunter","year":"2000","unstructured":"Gunter, C.A., Jim, T.: Policy-directed certificate retrieval. Software: Practice & Experience\u00a030(15), 1609\u20131640 (2000)","journal-title":"Software: Practice & Experience"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/CSFW.2002.1021812","volume-title":"Proceedings of the 15th IEEE Computer Security Foundations Workshop","author":"S. Jha","year":"2002","unstructured":"Jha, S., Reps, T.: Analysis of SPKI\/SDSI certificates using model checking. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop, pp. 129\u2013144. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/SECPRI.2001.924291","volume-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy","author":"T. Jim","year":"2001","unstructured":"Jim, T.: SD3: A trust management system with certified evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 106\u2013115. IEEE Computer Society Press, Los Alamitos (2001)"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1006\/jcss.1995.1051","volume":"51","author":"P.C. Kanellakis","year":"1995","unstructured":"Kanellakis, P.C., Kuper, G.M., Revesz, P.Z.: Constraint query languages. Journal of Computer and System Sciences\u00a051(1), 26\u201352 (1995)","journal-title":"Journal of Computer and System Sciences"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"12_CR11","first-page":"114","volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"1","key":"12_CR12","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. Journal of Computer Security\u00a011(1), 35\u201386 (2003)","journal-title":"Journal of Computer Security"},{"issue":"3-4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/0743-1066(91)90026-L","volume":"11","author":"R. Ramakrishnan","year":"1991","unstructured":"Ramakrishnan, R.: Magic templates: a spellbinding approach to logic programs. Journal of Logic Programming\u00a011(3-4), 189\u2013216 (1991)","journal-title":"Journal of Logic Programming"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/BFb0035010","volume-title":"Semantics in Databases","author":"P.Z. Revesz","year":"1998","unstructured":"Revesz, P.Z.: Constraint databases: A survey. In: Thalheim, B. (ed.) Semantics in Databases 1995. LNCS, vol.\u00a01358, pp. 209\u2013246. Springer, Heidelberg (1998)"},{"key":"12_CR15","unstructured":"Rivest, R.L., Lampson, B.: SDSI \u2014 a simple distributed security infrastructure (October 1996), available at: \n                    \n                      http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi11.html"},{"issue":"2","key":"12_CR16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1023\/A:1009799613661","volume":"2","author":"D. Toman","year":"1997","unstructured":"Toman, D.: Memoing evaluation for constraint extensions of Datalog. Constraints: An International Journal\u00a02, 337\u2013359 (1997)","journal-title":"Constraints: An International Journal"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:08:13Z","timestamp":1566763693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11935308_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}