{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:01:59Z","timestamp":1725512519200},"publisher-location":"Boston, MA","reference-count":23,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387094274"},{"type":"electronic","value":"9780387094281"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09428-1_1","type":"book-chapter","created":{"date-parts":[[2008,5,17]],"date-time":"2008-05-17T15:28:30Z","timestamp":1211038110000},"page":"1-16","source":"Crossref","is-referenced-by-count":5,"title":["Trust Management in P2P Systems Using Standard TuLiP"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Czenko","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"Doumen","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"K. R. Apt and I. Luitjes. Verification of logic programs with delay declarations. In AMAST, volume 936 of LNCS, pages 66-90. Springer, 1995.","DOI":"10.1007\/3-540-60043-4_47"},{"issue":"7","key":"1_CR2","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","volume":"16","author":"E Bertino","year":"2004","unstructured":"E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X : A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng., 16(7):827-842, 2004.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust-Management System, Version 2. IETF RFC 2704, September 1999.","DOI":"10.17487\/rfc2704"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proc. 17th IEEE Symposium on Security and Privacy, pages 164-173. IEEE Computer Society Press, May 1996.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"D. Clarke, J.E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate Chain Discovery in SPKI\/SDSI. Journal of Computer Security, 9(4):285-322, 2001.","DOI":"10.3233\/JCS-2001-9402"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"M. R. Czenko and S. Etalle. Core TuLiP - Logic Programming for Trust Management. In Proc. 23rd International Conference on Logic Programming, ICLP 2007, Porto, Portugal, volume 4670 of LNCS, pages 380-394, Berlin, 2007. Springer Verlag.","DOI":"10.1007\/978-3-540-74610-2_26"},{"key":"1_CR7","unstructured":"Freeband Communication. I-Share: Sharing resources in virtual communities for storage, communications, and processing of multimedia data.URL: http:\/\/www.freeband.nl\/project.cfm?language=en&id=520."},{"issue":"1\u20132","key":"1_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1019104520776","volume":"1","author":"SL Jarvenpaa","year":"2000","unstructured":"S. L. Jarvenpaa, N. Tractinsky, and M. Vitale. Consumer Trust in an Internet Store. Inf. Tech.and Management, 1(1-2):45-71, 2000.","journal-title":"Inf. Tech. and Management"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"T. Jim. SD3: A Trust Management System with Certified Evaluation. In Proc. IEEE Sympo-sium on Security and Privacy, pages 106-115. IEEE Computer Society Press, 2001.","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"1_CR10","unstructured":"F. Lee, D. Vogel, and M. Limayem. Adoption of informatics to support virtual communi-ties. In HICSS \u201902: Proc. 35th Annual Hawaii International Conference on System Sciences (HICSS\u201902)-Volume 8, page 214.2. IEEE Computer Society Press, 2002."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"N. Li, B. Grosof, and J. Feigenbaum. Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security (TISSEC), 6(1):128-171, 2003.","DOI":"10.1145\/605434.605438"},{"key":"1_CR12","unstructured":"N. Li, J. Mitchell, and W. Winsborough. Design of a Role-based Trust-management Frame-work. In Proc. IEEE Symposium on Security and Privacy, pages 114-130. IEEE Computer Society Press, 2002."},{"issue":"1","key":"1_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N Li","year":"2003","unstructured":"N. Li, W. Winsborough, and J. Mitchell. Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security, 11(1):35-86, 2003.","journal-title":"Journal of Computer Security"},{"key":"1_CR14","unstructured":"LIACC\/Universidade do Porto and COPPE Sistemas\/UFRJ. YAP Prolog, April 2006."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"W. Nejdl, D. Olmedilla, and M. Winslett. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. In Secure Data Management, pages 118-132, 2004.","DOI":"10.1007\/978-3-540-30073-1_9"},{"key":"1_CR16","unstructured":"OASIS. Assertions and Protocols for the OASIS: Security Assertion Markup Language (SAML) V2.0, March 2005."},{"key":"1_CR17","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 URL: http:\/\/www.oasis.org, Feb 2005."},{"key":"1_CR18","unstructured":"OASIS. SAML V2.0 Executive Overview, April 2005."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"S. Ratnasamy, P. Francis, M. Handley, R. M. Karp, and S. Shenker. A scalable content-addressable network. In SIGCOMM, pages 161-172, 2001.","DOI":"10.1145\/383059.383072"},{"key":"1_CR20","unstructured":"W3C. XML-Signature Syntax and Processing, Feb 2002."},{"key":"1_CR21","unstructured":"W3C. Extensible Markup Language (XML) 1.1 (Second Edition), Sep 2006."},{"key":"1_CR22","unstructured":"W3C. Namespaces in XML 1.0 (Second Edition), Aug 2006."},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"W. H. Winsborough and N. Li. Towards Practical Automated Trust Negotiation. In POLICY, pages 92-103. IEEE Computer Society Press, 2002.","DOI":"10.1109\/POLICY.2002.1011297"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Trust Management II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09428-1_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:33:02Z","timestamp":1605648782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09428-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387094274","9780387094281"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09428-1_1","relation":{},"subject":[]}}