{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T03:12:19Z","timestamp":1767237139255},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240587"},{"type":"electronic","value":"9783540305385"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30538-5_14","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T08:40:30Z","timestamp":1268383230000},"page":"161-173","source":"Crossref","is-referenced-by-count":17,"title":["A Calculus for Trust Management"],"prefix":"10.1007","author":[{"given":"Marco","family":"Carbone","sequence":"first","affiliation":[]},{"given":"Mogens","family":"Nielsen","sequence":"additional","affiliation":[]},{"given":"Vladimiro","family":"Sassone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"104","volume-title":"Proc. of the 28th symposium on Principles of Programming Languages POPL 2001","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. of the 28th symposium on Principles of Programming Languages POPL 2001, pp. 104\u2013115. ACM Press, New York (2001)"},{"key":"14_CR2","volume-title":"Foundations of databases","author":"S. Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of databases. Addison-Wesley, Reading (1995)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-46691-6_24","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"R. Amadio","year":"1999","unstructured":"Amadio, R., Boudol, G., Lhoussaine, C.: The receptive distributed pi-calculus. In: Pandu Rangan, C., Raman, V., Sarukkai, S. (eds.) FST TCS 1999. LNCS, vol.\u00a01738, pp. 304\u2013315. Springer, Heidelberg (1999)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Appel, A.W., Felten, E.W.: Proof-carrying authentication. In: Proc. of\u00a06th ACM Conference on Computer and Communications Security, CCS 1999 (1999)","DOI":"10.1145\/319709.319718"},{"key":"14_CR5","volume-title":"Proc. of the 17th IEEE Computer Security Foundations Workshop CSFW 2004","author":"M.Y. Becker","year":"2004","unstructured":"Becker, M.Y., Sewell, P.: Flexible trust management, applied to electronic health records. In: Proc. of the 17th IEEE Computer Security Foundations Workshop CSFW 2004. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"14_CR6","unstructured":"Burrows, M., Abadi, M., Lampson, B.W., Plotkin, G.: A calculus for access control in distributed systems. In: Proc. of 11th Annual International Cryptology Conference Advances in Cryptology CRYPTO 1991, vol.\u00a0576, pp. 1\u201323 (1991)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Carbone, M., Maffies, S.: On the expressive power of polyadic synchronisation in \u03c0-calculus. Nordic Journal of Computing (NJC)\u00a010(2) (September 2003)","DOI":"10.1016\/S1571-0661(05)80361-5"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/SEFM.2003.1236207","volume-title":"Proc. of International Conference on Software Engineering and Formal Methods SEFM 2003","author":"M. Carbone","year":"2003","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: Proc. of International Conference on Software Engineering and Formal Methods SEFM 2003, pp. 54\u201361. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-24725-8_23","volume-title":"Programming Languages and Systems","author":"J. Guttman","year":"2004","unstructured":"Guttman, J., Thayer, J., Carlson, J., Herzog, J., Ramsdell, J., Sniffen, B.: Trust management in strand spaces: A rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 325\u2013339. Springer, Heidelberg (2004)"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Information and Computation\u00a0173(1), 82\u2013120 (2002)","journal-title":"Information and Computation"},{"key":"14_CR11","first-page":"31","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"S. Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 31\u201342. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Jones, A.J.I., Firozabadi, B.S.: On the characterisation of a trusting agent. In: Workshop on Deception, Trust and Fraud in Agent Societies (2000)","DOI":"10.1007\/978-94-017-3614-5_8"},{"key":"14_CR13","first-page":"114","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R. Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, I and II. Information and Computation\u00a0100(1), 1\u201340, 41\u201377 (1992)","journal-title":"Information and Computation"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/263699.263731","volume-title":"Proc. of the 24th symposium on Principles of Programming Languages POPL1997","author":"C. Palamidessi","year":"1997","unstructured":"Palamidessi, C.: Comparing the expressive power of the synchronous and the asynchronous \u03c0-calculus. In: Proc. of the 24th symposium on Principles of Programming Languages POPL1997, pp. 256\u2013265. ACM Press, New York (1997)"}],"container-title":["Lecture Notes in Computer Science","FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30538-5_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:58:44Z","timestamp":1605743924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30538-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240587","9783540305385"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30538-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}