{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:36:47Z","timestamp":1763203007423,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031767135"},{"type":"electronic","value":"9783031767142"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-76714-2_1","type":"book-chapter","created":{"date-parts":[[2024,12,21]],"date-time":"2024-12-21T07:07:49Z","timestamp":1734764869000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Continuous Authorization Architecture for\u00a0Dynamic Trust Evaluation"],"prefix":"10.1007","author":[{"given":"Hussein","family":"Joumaa","sequence":"first","affiliation":[]},{"given":"Ana","family":"Petrovska","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Hariri","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,22]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Almutairi, A., Siewe, F.: Ca-ucon: a context-aware usage control model. In: Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems, pp. 38\u201343 (2011)","DOI":"10.1145\/2036146.2036153"},{"key":"1_CR2","unstructured":"Chung, Ferraiolo, D., Kuhn, D., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations (2019-02-25 2019). https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=927500"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Dimitrakos, T., et al.: Trust aware continuous authorization for zero trust in consumer internet of things. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1801\u20131812 (2020). https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00247","DOI":"10.1109\/TrustCom50675.2020.00247"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Dimitrakos, T.: System models, e-risks and e-trust - towards bridging the gap? In: (I3E 2001), Z\u00fcrich, Switzerland. vol.\u00a0202, pp. 45\u201358. Kluwer (2001)","DOI":"10.1007\/0-306-47009-8_4"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-030-78120-0_3","volume-title":"ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22\u201324, 2021, Proceedings","author":"A Hariri","year":"2021","unstructured":"Hariri, A., Bandopadhyay, S., Rizos, A., Dimitrakos, T., Crispo, B., Rajarajan, M.: SIUV: a smart car identity management and usage control system based on verifiable credentials. In: J\u00f8sang, A., Futcher, L., Hagen, J. (eds.) ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22\u201324, 2021, Proceedings, pp. 36\u201350. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78120-0_3"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-031-16088-2_10","volume-title":"Collaborative Approaches for Cyber Security in Cyber-Physical Systems","author":"A Hariri","year":"2023","unstructured":"Hariri, A., et al.: UCON+: comprehensive model, architecture and implementation for usage control and continuous authorization. In: Dimitrakos, T., Lopez, J., Martinelli, F. (eds.) Collaborative Approaches for Cyber Security in Cyber-Physical Systems, pp. 209\u2013226. Springer International Publishing, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-16088-2_10"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Hariri, A., Ibrahim, A., Dimitrakos, T., Crispo, B.: Wip: Metamodel for continuous authorisation and usage control. In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, pp. 43\u201348 (2022)","DOI":"10.1145\/3532105.3535039"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"He, Y., Huang, D., Chen, L., Ni, Y., Ma, X.: A survey on zero trust architecture: challenges and future trends. Wireless Commun. Mobile Comput. 2022 (2022)","DOI":"10.1155\/2022\/6476274"},{"key":"1_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42337-1","volume-title":"Subjective Logic","author":"A J\u00f8sang","year":"2016","unstructured":"J\u00f8sang, A.: Subjective Logic. Springer International Publishing, Cham (2016)"},{"key":"1_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42337-1","volume-title":"Subjective Logic","author":"A J\u00f8sang","year":"2016","unstructured":"J\u00f8sang, A.: Subjective Logic. Springer International Publishing, Cham (2016)"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15152-1_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"L Krautsevich","year":"2010","unstructured":"Krautsevich, L., Lazouski, A., Martinelli, F., Mori, P., Yautsiukhin, A.: Usage control, risk and trust. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) Trust, Privacy and Security in Digital Business, pp. 1\u201312. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15152-1_1"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-32287-7_7","volume-title":"Trust, Privacy and Security in Digital Business","author":"A Lazouski","year":"2012","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: A prototype for enforcing usage control policies based on XACML. In: Fischer-H\u00fcbner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 79\u201392. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32287-7_7"},{"issue":"5","key":"1_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MC.2010.134","volume":"43","author":"MS Lund","year":"2010","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Evolution in relation to risk and trust management. IEEE Comput. 43(5), 49\u201355 (2010)","journal-title":"IEEE Comput."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"M\u00fcller, J., Gabb, M., Buchholz, M.: A subjective-logic-based reliability estimation mechanism for cooperative information with application to iv\u2019s safety. In: 2019 IEEE Intelligent Vehicles Symposium (IV), pp. 1940\u20131946. IEEE (2019)","DOI":"10.1109\/IVS.2019.8814153"},{"key":"1_CR15","unstructured":"OASIS: Abbreviated language for authorization Version 1.0 (2015). https:\/\/bit.ly\/2UP6Jza"},{"key":"1_CR16","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0 Plus Errata 01 (2017). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-en.html"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Trans. Inform. Syst. Secur. 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inform. Syst. Secur."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Petrovska, A., Neuss, M., Gerostathopoulos, I., Pretschner, A.: Run-time reasoning from uncertain observations with subjective logic in multi-agent self-adaptive cyber-physical systems. In: 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 130\u2013141. IEEE (2021)","DOI":"10.1109\/SEAMS51251.2021.00026"},{"issue":"11","key":"1_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"RS Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-based access control models. Computer 26(11), 9\u201319 (1993)","journal-title":"Computer"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., et\u00a0al.: Role-based access control models. Computer 29(2) (1996)","DOI":"10.1109\/2.485845"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Scott\u00a0Rose, Oliver\u00a0Borchert, S.M., Connelly, S.: Zero Trust Architecture (5 2020). https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-207\/final","DOI":"10.6028\/NIST.SP.800-207"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Vishi, K., J\u00f8sang, A.: A new approach for multi-biometric fusion based on subjective logic. In: IML 2017, Liverpool, United Kingdom. ACM (2017)","DOI":"10.1145\/3109761.3158409"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Wasnik, P., Raghavendra, R., Raja, K., Busch, C.: Subjective logic based score level fusion: Combining faces and fingerprints. In: 2018 21st International Conference on Information Fusion (FUSION), pp. 515\u2013520. IEEE (2018)","DOI":"10.23919\/ICIF.2018.8455860"},{"issue":"2","key":"1_CR24","first-page":"347","volume":"22","author":"P Xie","year":"2020","unstructured":"Xie, P., et al.: Adaptive access control model of vehicular network big data based on XACML and security risk. I. J. Netw. Secur. 22(2), 347\u2013357 (2020)","journal-title":"I. J. Netw. Secur."}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-76714-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,21]],"date-time":"2024-12-21T08:02:31Z","timestamp":1734768151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-76714-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031767135","9783031767142"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-76714-2_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFIPTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifiptm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/event.cwi.nl\/ifiptm2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}