{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:31:48Z","timestamp":1777372308138,"version":"3.51.4"},"publisher-location":"Boston, MA","reference-count":7,"publisher":"Springer US","isbn-type":[{"value":"9780387754932","type":"print"},{"value":"9780387754949","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-75494-9_62","type":"book-chapter","created":{"date-parts":[[2007,12,27]],"date-time":"2007-12-27T01:39:36Z","timestamp":1198719576000},"page":"514-520","source":"Crossref","is-referenced-by-count":2,"title":["Trust-based Access Control in Virtual Learning Community"],"prefix":"10.1007","author":[{"given":"Shujuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qingtang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"62_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. S. Sandhu","year":"1996","unstructured":"R. S. Sandhu, \u201cRole-Based Access Control Models\u201d, IEEE Computer, 29(2):38\u201347, (Feb. 1996)","journal-title":"IEEE Computer"},{"key":"62_CR2","unstructured":"D. F. Ferraiolo and D. Richard Kuhn, \u201cRamaswamy Chandramouli\u201d, Role-Based Access Control (Artech House, 2003), ISBN: 1580533701"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"K. Aberer and Z. Despotovic, \u201cManaging Trust in a Peer-2-Peer Information System\u201d, In: Proc. of the Tenth Intl. Conf. on. Information and Knowledge Management (ACM CIKM\u201901), 310\u2013317(2001).","DOI":"10.1145\/502585.502638"},{"key":"62_CR4","unstructured":"H.L. Ma, \u201csociological analyses of virtual learning community\u201d, Distance Education in Chin, 20\u201324(2006)."},{"key":"62_CR5","unstructured":"Z. K. Yang, H. B. Liu and Q. T. Liu, \u201cApplication Research for Role Based Access Control Technique in E-Learning\u201d, Application Research of Computers, 133\u2013136 (Oct. 2005)."},{"issue":"5","key":"62_CR6","first-page":"31","volume":"32","author":"S. Q. Zhang","year":"2005","unstructured":"S. Q. Zhang, D.X. Lu, Y.T. Yang, \u201cTrust-Based Access Control in P2P Networks\u201d, Computer Science, vol.32 No.5, 31\u201333(2005)","journal-title":"Computer Science"},{"issue":"3","key":"62_CR7","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSMCA.2006.871796","volume":"36","author":"E. Bertino","year":"2006","unstructured":"E. Bertino, L. Khan, R. Sandhu and B. Thuraisingham, \u201cSecure Knowledge Management: Confidentiality, Trust, and Privacy\u201d, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 36(3):429\u2013438, (May 2006)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"}],"container-title":["IFIP International Federation for Information Processing","Integration and Innovation Orient to E-Society Volume 2"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-75494-9_62.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T03:53:29Z","timestamp":1619668409000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-75494-9_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387754932","9780387754949"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-75494-9_62","relation":{},"subject":[]}}