{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T17:40:08Z","timestamp":1751737208372,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319957289"},{"type":"electronic","value":"9783319957296"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95729-6_5","type":"book-chapter","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T13:19:16Z","timestamp":1531142356000},"page":"69-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Policy Languages and Their Suitability for Trust Negotiation"],"prefix":"10.1007","author":[{"given":"Martin","family":"Kolar","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Fernandez-Gago","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,10]]},"reference":[{"key":"5_CR1","unstructured":"Gambetta, D.: Can We Trust Trust? Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013238. B. Blackwell, Oxford (1990)"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A Survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. Commun. Surveys Tuts. (2000)","DOI":"10.1109\/COMST.2000.5340804"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, DISCEX 2000, Proceedings, vol. 1, pp. 88\u2013102 (2000)","DOI":"10.1109\/DISCEX.2000.824965"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp. 92\u2013103 (2002)","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"5_CR6","unstructured":"Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: 2003 Symposium on Security and Privacy, pp. 110\u2013122 (2003)"},{"key":"5_CR7","unstructured":"Moyano, F.: Trust engineering framework for software services. Ph.D. thesis, Lenguajes y Ciencias de la Computacin, Universidad de Mlaga (2015)"},{"issue":"6","key":"5_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M Winslett","year":"2002","unstructured":"Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust in the web. IEEE Internet Comput. 6(6), 30\u201337 (2002)","journal-title":"IEEE Internet Comput."},{"key":"5_CR9","unstructured":"Lee, A.J., Winslett, M., Perano, K.J.: TrustBuilder2: a recongurable framework for trust negotiation. No. SAND2007-1928C. Sandia National Laboratories (SNL-CA), Livermore, CA (United States) (2007)"},{"key":"5_CR10","unstructured":"Kasem-Madani, S., Meier, M.: Security and privacy policy languages: a survey, categorization and gap identification. arXiv preprint arXiv:1512.00201 (2015)"},{"key":"5_CR11","unstructured":"Kumaraguru, P., et al.: A survey of privacy policy languages. In: Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM (2007)"},{"key":"5_CR12","unstructured":"Seamons, K.E., et al.: Requirements for policy languages for trust negotiation. In: 2002 IEEE Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (2002)"},{"key":"5_CR13","unstructured":"Parducci, B., Lockart, H.: eXtensible Access Control Markup Language (XACML) 3.0. Committee Specification 01, 10 August 2010"},{"key":"5_CR14","unstructured":"Ardagna, C.A., et al.: Primelife policy language. In: W3C Workshop on Access Control Application Scenarios. W3C (2009)"},{"key":"5_CR15","unstructured":"Trabelsi, S., et al.: PPL engine: a symmetric architecture for privacy policy handling. In: W3C Workshop on Privacy and Data Usage Control, vol. 4, no. 5 (2010)"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Azraoui M., et al.: A-PPL: an accountability policy language. In: Garcia-Alfaro, J., et al. (eds.) DPM\/QASA\/SETOP -2014. LNCS, vol. 8872, pp. 319\u2013326. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17016-9_21","DOI":"10.1007\/978-3-319-17016-9_21"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Iyilade, J., Vassileva, J.: P2U: a privacy policy specification language for secondary data sharing and usage. In: 2014 IEEE Security and Privacy Workshops (2014)","DOI":"10.1109\/SPW.2014.12"},{"key":"5_CR18","unstructured":"Gall, Y.L., Lee, A.J., Kapadia, A.: PlexC: a policy language for exposure control. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (2012)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004, Proceedings. IEEE (2004)","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"5_CR20","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.: X-TNL: an XML-based language for trust negotiations. In: Proceedings POLICY 2003, IEEE 4th International Workshop on Policies for Distributed Systems and Networks (2003)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: XPref: a preference language for P3P. Computer Networks (2005)","DOI":"10.1016\/j.comnet.2005.01.004"},{"key":"5_CR22","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: Proceedings, 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097) (1997)"},{"key":"5_CR23","unstructured":"Clark, J., DeRose, S.: XML Path Language (XPath) Version 1.0. W3C Recommendation (1999)"},{"key":"5_CR24","unstructured":"Berker, M.Y., Malkis, A., Bussard, L.: A Framework for Privacy Preferences and Data-Handling Policies. Technical Report MSR-TR-2009-128 (2009)"},{"issue":"11","key":"5_CR25","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/TKDE.2010.83","volume":"22","author":"PA Bonatti","year":"2010","unstructured":"Bonatti, P.A., De Coi, J.L., Olmedilla, D., Sauro, L.: A rule-based trust negotiation system. IEEE Trans. Knowl. Data Eng. 22(11), 1507\u20131520 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.istr.2012.10.002","volume":"17","author":"M Dell\u2019Amico","year":"2013","unstructured":"Dell\u2019Amico, M., et al.: HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems. Inf. Secur. Tech. Rep. 17, 81\u201392 (2013)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"5_CR27","unstructured":"PRML: Privacy Rights Markup Language Specification Version 0.9. Zero-Knowledge Systems (2001)"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Samarati, P.: Regulating service access and information release on the web. In: 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 2000","DOI":"10.1145\/352600.352620"},{"key":"5_CR29","unstructured":"Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: assigning roles to strangers. In: Proceeding 2000 IEEE Symposium on Security and Privacy, S&P 2000, Berkeley, CA, pp. 2\u201314 (2000)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Bertino, E., Castano, S., Ferrari, E.: On specifying security policies for web documents with an XML-based language. In: Sixth ACM SACMAT, Chantilly, Virginia (2001)","DOI":"10.1145\/373256.373264"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System Version 2. RFC 2704, September 1999","DOI":"10.17487\/rfc2704"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95729-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T17:21:44Z","timestamp":1751736104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95729-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319957289","9783319957296"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95729-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergamo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec18.unibg.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}