{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:51Z","timestamp":1725496251112},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"},{"type":"electronic","value":"9780387736556"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-73655-6_7","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T01:41:46Z","timestamp":1195782106000},"page":"91-106","source":"Crossref","is-referenced-by-count":2,"title":["Validating a Trust-based Access Control System"],"prefix":"10.1007","author":[{"given":"William J.","family":"Adams","sequence":"first","affiliation":[]},{"suffix":"IV","given":"Nathaniel J.","family":"Davis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Lo Presti, S., M. Butler, et al.: A Trust Analysis Methodology for Pervasive Computing Systems. Trusting Agents for trusting Electronic Societies. R. Falcone, S. Barber, J. Sabater and M. Singh, Springer (2005) 129\u2013143"},{"key":"7_CR2","volume-title":"Ph.D. Dissertation","author":"W. J. Adams","year":"2006","unstructured":"W. J. Adams. Decentralized Trust-Based Access Control for Dynamic Collaborative Environments, Ph.D. Dissertation, Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA (2006)"},{"key":"7_CR3","unstructured":"Freudenthal, E., T. Pesin, et al.: dRBAC: distributed role-based access control for dynamic coalition environments. Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002). Vienna, AU, 2\u20135 July 2002, (2002) 411\u2013420."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., Shand, B., Gray, E., Bryce, C., Dimmock, N.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing 2 (2003) 52\u201361","journal-title":"IEEE Pervasive Computing"},{"key":"7_CR5","unstructured":"Kagal, L., T. Finin, et al.: A framework for distributed trust management. Proceedings of International Joint Conference on Artificial Intelligence (IJCAI-01), Workshop on Autonomy, Delegation and Control, 2001, Seattle, WA (2001) 73\u201380."},{"key":"7_CR6","unstructured":"Bryce, C., N. Dimmock, et al.: Towards an Evaluation Methodology for Computational Trust Systems. Proceedings of the Third International Conference in Trust Management (iTrust 2005), Paris, FR (2005) 289\u2013304."},{"key":"7_CR7","unstructured":"FEMA: Scenario and Incident Action Plan Catalog. Retrieved from http:\/\/www.nwcg.gov\/pms\/forms\/compan\/iap.pdf (1994)"},{"key":"7_CR8","unstructured":"FEMA: Incident Command System. Retrieved from http:\/\/training.fema.gov\/EMIWeb\/IS\/isl95.asp (2004)"},{"key":"7_CR9","unstructured":"de Waal, C. and M. Gerharz: BonnMotion. Retrieved from http:\/\/web.informatik.uni-bonn.de\/IV\/Mitarbeiter\/dewaal\/BonnMotion\/(2005)"},{"issue":"5","key":"7_CR10","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T. Camp","year":"2002","unstructured":"Camp, T., J. Boleng, et al.: A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communication & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications 2(5) (2002) 483\u2013502.","journal-title":"Wireless Communication & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications"},{"key":"7_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04421-6","volume-title":"Performance of communication systems: a model based evaluation with matrix geometric methods","author":"A. Ost","year":"2001","unstructured":"Ost, A.: Performance of communication systems: a model based evaluation with matrix geometric methods. New York, Springer (2001)"},{"issue":"5","key":"7_CR12","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/90.649564","volume":"5","author":"J. Heidemann","year":"1997","unstructured":"Heidemann, J., K. Obraczka, et al.: Modeling the performance of HTTP over several transport protocols. Networking, IEEE\/ACM Transactions on 5(5) (1997) 616\u2013630.","journal-title":"Networking, IEEE\/ACM Transactions"},{"key":"7_CR13","unstructured":"Buchegger, S. and J.-Y. Le Boudec: A Robust Reputation System for Mobile Ad-Hoc Networks. Lausanne, Switzerland, Ecole Polytechnic Federal de Lausanne (2003)"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T10:11:29Z","timestamp":1580292689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387736549","9780387736556"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_7","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}