{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:03:46Z","timestamp":1748837026351,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_28","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T08:40:02Z","timestamp":1453538402000},"page":"519-537","source":"Crossref","is-referenced-by-count":0,"title":["A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Cra\u00df","sequence":"first","affiliation":[]},{"given":"Gerson","family":"Joskowicz","sequence":"additional","affiliation":[]},{"given":"Eva","family":"K\u00fchn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-39650-5_3","volume-title":"Computer Security \u2013 ESORICS 2003","author":"X Ao","year":"2003","unstructured":"Ao, X., Minsky, N.H.: Flexible regulation of distributed coalitions. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 39\u201360. Springer, Heidelberg (2003)"},{"issue":"6","key":"28_CR2","doi-asserted-by":"publisher","first-page":"1220","DOI":"10.1109\/TSMCA.2010.2046727","volume":"40","author":"T Ahmed","year":"2010","unstructured":"Ahmed, T., Tripathi, A.R.: Security Policies in Distributed CSCW and Workflow Systems. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 40(6), 1220\u20131231 (2010)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Gomi, H., Hatakeyama, M., Hosono, S., Fujita, S.: A delegation framework for federated identity management. In: 2005 Workshop on Digital Identity Management, pp. 94\u2013103. ACM (2005)","DOI":"10.1145\/1102486.1102502"},{"issue":"11","key":"28_CR4","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1002\/cpe.1313","volume":"20","author":"D Chadwick","year":"2008","unstructured":"Chadwick, D., Zhao, G., Otenko, S., Laborde, R., Su, L., Nguyen, T.A.: PERMIS: A modular authorization infrastructure. Concurrency Computation Practice and Experience 20(11), 1341\u20131357 (2008)","journal-title":"Concurrency Computation Practice and Experience"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Crispo, B., Sivasubramanian, S., Mazzoleni, P., Bertino, E.: P-Hera: scalable fine-grained access control for P2P infrastructures. In: 11th International Conference on Parallel and Distributed Systems, vol. 1, pp. 585\u2013591. IEEE (2005)","DOI":"10.1109\/ICPADS.2005.215"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-38493-6_9","volume-title":"Coordination Models and Languages","author":"E K\u00fchn","year":"2013","unstructured":"K\u00fchn, E., Cra\u00df, S., Joskowicz, G., Marek, A., Scheller, T.: Peer-based programming model for coordination patterns. In: De Nicola, R., Julien, C. (eds.) COORDINATION 2013. LNCS, vol. 7890, pp. 121\u2013135. Springer, Heidelberg (2013)"},{"key":"28_CR7","unstructured":"K\u00fchn, E., Mordinyi, R., Keszthelyi, L., Schreiber, C.: Introducing the concept of customizable structured spaces for agent coordination in the production automation domain. In: 8th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 625\u2013632. IFAAMAS (2009)"},{"issue":"4","key":"28_CR8","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1145\/63334.63337","volume":"32","author":"N Carriero","year":"1989","unstructured":"Carriero, N., Gelernter, D.: Linda in context. Communications of the ACM 32(4), 444\u2013458 (1989)","journal-title":"Communications of the ACM"},{"issue":"1","key":"28_CR9","first-page":"76","volume":"4","author":"S Cra\u00df","year":"2013","unstructured":"Cra\u00df, S., D\u00f6nz, T., Joskowicz, G., K\u00fchn, E., Marek, A.: Securing a Space-Based Service Architecture with Coordination-Driven Access Control. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 4(1), 76\u201397 (2013)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: 2005 IEEE International Conference on Web Services, pp. 561\u2013569. IEEE (2005)","DOI":"10.1109\/ICWS.2005.25"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"issue":"4","key":"28_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems 10(4), 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"28_CR13","unstructured":"Moses, T.: eXtensible Access Control Markup Language (XACML) Version 2.0. Standard, OASIS (2005)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Cra\u00df, S., D\u00f6nz, T., Joskowicz, G., K\u00fchn, E.: A coordination-driven authorization framework for space containers. In: 7th International Conference on Availability, Reliability and Security, pp. 133\u2013142. IEEE (2012)","DOI":"10.1109\/ARES.2012.56"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"K\u00fchn, E., Cra\u00df, S., Schermann, G.: Extending a peer-based coordination model with composable design patterns. In: 23rd Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 53\u201361. IEEE (2015)","DOI":"10.1109\/PDP.2015.99"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Gasser, M., McDermott, E.: An architecture for practical delegation in a distributed system. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 20\u201330. IEEE (1990)","DOI":"10.1109\/RISP.1990.63835"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Opyrchal, L., Prakash, A., Agrawal, A.: Designing a publish-subscribe substrate for privacy\/security in pervasive environments. In: 2006 ACS\/IEEE International Conference on Pervasive Services, pp. 313\u2013316. IEEE (2006)","DOI":"10.1109\/PERSER.2006.1652251"},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-45263-X_7","volume-title":"Coordination Languages and Models","author":"M Cremonini","year":"2000","unstructured":"Cremonini, M., Omicini, A., Zambonelli, F.: Coordination and access control in open distributed agent systems: the TuCSoN approach. In: Porto, A., Roman, G.-C. (eds.) COORDINATION 2000. LNCS, vol. 1906, pp. 99\u2013114. Springer, Heidelberg (2000)"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Benigni, F., Brogi, A., Buchholz, J.L., Jacquet, J.M., Lange, J., Popescu, R.: Secure P2P programming on top of tuple spaces. In: 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 54\u201359. IEEE (2008)","DOI":"10.1109\/WETICE.2008.29"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T06:36:54Z","timestamp":1748759814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}