{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:56:22Z","timestamp":1725483382446},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442639"},{"type":"electronic","value":"9783540458074"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45807-7_28","type":"book-chapter","created":{"date-parts":[[2007,5,3]],"date-time":"2007-05-03T20:46:46Z","timestamp":1178225206000},"page":"188-201","source":"Crossref","is-referenced-by-count":6,"title":["On the Negotiation of Access Control Policies"],"prefix":"10.1007","author":[{"given":"Virgil D.","family":"Gligor","sequence":"first","affiliation":[]},{"given":"Himanshu","family":"Khurana","sequence":"additional","affiliation":[]},{"given":"Radostina K.","family":"Koleva","sequence":"additional","affiliation":[]},{"given":"Vijay G.","family":"Bharadwaj","sequence":"additional","affiliation":[]},{"given":"John S.","family":"Baras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"28_CR1","volume-title":"Social Choice and Individual Values","author":"K. J. Arrow","year":"1963","unstructured":"K. J. Arrow. Social Choice and Individual Values. Yale University Press, New Haven, CT, second edition, 1963.","edition":"second edition"},{"key":"28_CR2","unstructured":"F. Forgo, J. Szep, and F. Szidarovsky. Introduction to the Theory of Games: Concepts, Methods, Applications, volume 32 of Nonconvex Optimization and Its Applications. Kluwer Academic Publishers, 1999."},{"key":"28_CR3","unstructured":"T. J. Gibson. An architecture for flexible multi-security domain networks. In Proceedings of Network and Distributed System Security Symposium, San Diego, CA, February 2001. The Internet Society."},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"V. D. Gligor, S.I. Gavrila, and D. Ferraiolo. On the formal definition of separation-of-duty policies and their composition. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, California, May 1998.","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"V.D. Gligor and S.I. Gavrila. Application-oriented security policies and their composition. In Proceedings of Security Protocols 6th International Workshop, Cambridge, UK, April 1998.","DOI":"10.1007\/3-540-49135-X_12"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2000.","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"H. Khurana and V.D. Gligor. Review and revocation of access privileges distributed with PKI certificates. In Proceedings of the 8th International Workshop on Security Protocols, volume 2133, pages 100\u2013125, Cambridge, UK, April 2000.","DOI":"10.1007\/3-540-44810-1_15"},{"key":"28_CR8","unstructured":"H. Khurana and V.D. Gligor. Enforcing of certificate dependencies in ad-hoc networks. In Proceedings of the IEEE International Conference on Telecommunications, Romania, April 2001. ISBN: 973-99995-1-4."},{"key":"28_CR9","unstructured":"H. Khurana, V.D. Gligor, and J. Linn. Reasoning about joint administration of access policies for coalition resources. Submitted for publication. Available at http:\/\/www.glue.umd.edu\/~gligor ."},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1137\/0117107","volume":"17","author":"D. Schmeidler","year":"1968","unstructured":"D. Schmeidler. The nucleolus of a characteristic function game. SIAM Journal on Applied Mathematics, 17:1163\u20131170, 1968.","journal-title":"SIAM Journal on Applied Mathematics"},{"key":"28_CR11","unstructured":"K. E. Seamons, M. Winslett, and T. Yu. Limiting the disclosure of access control policies during automated trust negotiation. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, February 2001."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"D. Shands, R. Yee, J. Jacobs, and E. J. Sebes. Secure virtual enclaves: Supporting coalition use of distributed application technologies. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, 3\u20134 February 2000.","DOI":"10.1145\/501963.501964"},{"key":"28_CR13","unstructured":"W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition (DISCEX 2000), Hilton Head, SC, January 2000."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45807-7_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:18:25Z","timestamp":1556374705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45807-7_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442639","9783540458074"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45807-7_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}