{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T03:40:31Z","timestamp":1737171631794,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441106"},{"type":"electronic","value":"9783540461210"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46121-3_17","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T18:07:47Z","timestamp":1183399667000},"page":"151-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Trust-Based Security Model and Enforcement Mechanism for Web Service Technology"],"prefix":"10.1007","author":[{"given":"Seokwon","family":"Yang","sequence":"first","affiliation":[]},{"given":"Herman","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Stanley Y. W.","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,23]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Curbera, Francisco, et al., \u201cUnraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI,\u201d IEEE Internet Computing, March\/April, 2002.","DOI":"10.1109\/4236.991449"},{"key":"17_CR2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/2.982908","volume":"35","author":"S. Vaughan-Nichols","year":"2002","unstructured":"Vaughan-Nichols, Steven, \u201cWeb Services: Beyond the Hype,\u201d IEEE Computer, February 2002, Vol. 35, No. 2, pp. 18\u201321.","journal-title":"IEEE Computer"},{"key":"17_CR3","unstructured":"Blaze, Matt, Feigenbaum, Joan, and Lacy, Jack, \u201cDecentralized Trust Management,\u201d Proceedings 1996 IEEE Symposium on Security and Privacy, May 1996."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Blaze, Matt, Feigenbaum, Joan, and Lacy, Jack, \u201cTrust management for public-key infra-structures,\u201d Cambridge 1998 Security Protocols International Workshop, England, 1998.","DOI":"10.1007\/3-540-49135-X_9"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Chu, Y., Feigenbaum, J., LaMacchia, B., Resnick, B, and Strauss, M., \u201cREFEREE: Trust management for Web applications,\u201d The World Wide Web Journal, 1997.","DOI":"10.1016\/S0169-7552(97)00009-3"},{"key":"17_CR6","unstructured":"Herzberg, A., Mass, Y. and Mihaeli, J., \u201cAccess Control Meets Public Key Infrastructure,\u201d IEEE Symposium on Security and Privacy 2000."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Czerwinski, Steven E., Zhao, Ben Y., Hodes, Todd, Joseph, Anthony D., and Katz, Randy, \u201cAn Architecture for a Secure Service Discovery Service,\u201d Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM\u2019 99), Seattle, WA, August 1999.","DOI":"10.1145\/313451.313462"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Johnston, W., Mudumbai, S., and Thompson, M., \u201cAuthorization and attribute certificates for widely distributed access control,\u201d IEEE 7th International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises \u2014 WETICE, 1998, pp. 340\u2013345.","DOI":"10.1109\/ENABL.1998.725715"},{"issue":"1","key":"17_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M. Nyanchama","year":"1999","unstructured":"Nyanchama, M., and Osborn, S., \u201cThe Role Graph Model and Conflict of Interest,\u201d ACM Transactions on Information and System Security, 2(1), February 1999, pp. 3\u201333.","journal-title":"ACM Transactions on Information and System Security"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D. and Chandramouli R.. \u201cProposed NIST Standard for Role-Based Access Control,\u201d ACM TISSEC, Volume 4, No. 3, August 2001.","DOI":"10.1145\/501978.501980"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Hildmann, T. and Barholdt, J., \u201cManaging trust between collaborating companies using outsourced role based access control,\u201d Proc. of 4th. ACM Workshop on Role-based Access Control, Oct. 28\u201329, 1999, Fairfax, VA, USA, pp. 105\u2013111.","DOI":"10.1145\/319171.319181"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Hayton, R. J., Bacon, J. M., and Moody, K., \u201cAccess control in an open distributed environment,\u201d IEEE Symposium on Security and Privacy, May 1998, pp. 3\u201314.","DOI":"10.1109\/SECPRI.1998.674819"},{"key":"17_CR13","unstructured":"Winslett, M., Ching, N., Jones, N. and Slepchin, I., \u201cAssuring security and privacy for digital library transactions on the web: client and server security policies,\u201d Proceedings of ADL\u201997, Washington, DC, May 1997."},{"key":"17_CR14","unstructured":"Bertino, Elisa, and Ferrari, E., \u201cData Security,\u201d Proc. of 22nd IEEE Annual International Computer Software & Application Conference (COMPSAC), Vienna (Austria), August 19\u201321, 1998, IEEE Computer Society Press."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Su, S.Y.W., Lam, H., Arroyo, J., Yu, T. F., and Yang, Z., \u201cAn Extensible Knowledge Base Management System for Supporting Rule-based Interoperability among Heterogeneous Systems,\u201d Proc. of the Conf. on Information and Knowledge Management, Baltimore, MD, Nov.28\u2013Dec.2, 1995, pp. 1\u201310.","DOI":"10.1145\/221270.221280"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Su, S.Y.W., Lam, H., Lee, M., Bai, S., and Shen, Z., \u201cAn Information Infrastructure and Eservices for Supporting Internet-based Scalable E-business Enterprises,\u201d Proceedings of the 5th International Enterprise Distributed Object Conference (EDOC 2001), Seattle, WA, Sept.4\u20137, 2001, pp. 2\u201313.","DOI":"10.1109\/EDOC.2001.950418"},{"issue":"1\/2","key":"17_CR17","first-page":"121","volume":"4","author":"M.S. Lee","year":"2001","unstructured":"Lee, M.S., Su, S.Y.W., and Lam, H., \u201cA Web-based Knowledge Network for Supporting Emerging Internet Applications,\u201d WWW Journal, Vol. 4, No. 1\/2, 2001, pp. 121\u2013140.","journal-title":"WWW Journal"}],"container-title":["Lecture Notes in Computer Science","Technologies for E-Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46121-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T03:01:57Z","timestamp":1737169317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46121-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441106","9783540461210"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-46121-3_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"23 August 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}