{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:00:12Z","timestamp":1742378412979},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540203629"},{"type":"electronic","value":"9783540397182"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39718-2_26","type":"book-chapter","created":{"date-parts":[[2010,9,3]],"date-time":"2010-09-03T22:01:33Z","timestamp":1283551293000},"page":"402-418","source":"Crossref","is-referenced-by-count":118,"title":["A Policy Based Approach to Security for the Semantic Web"],"prefix":"10.1007","author":[{"given":"Lalana","family":"Kagal","sequence":"first","affiliation":[]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Cost, R., Finin, T., Joshi, A., Peng, Y., Nicholas, C., Soboroff, I., Chen, H., Kagal, L., Perich, F., Zou, Y., Tolia, S.: ITTALKS: A Case Study in DAML and the Semantic Web. IEEE Intelligent Systems Special Issue 2002 (2002)","DOI":"10.1109\/5254.988447"},{"key":"26_CR2","unstructured":"Horrocks, I., van Harmelen, F., Patel-Schneider, P., Berners-Lee, T., Brickley, D., Connolly, D., Dean, M., Decker, S., Fensel, D., Fikes, R., Hayes, P., Heflin, J., Hendler, J., Lassila, O., McGuinness, D., Stein, L.A.: DAML+OIL Language Specifications (2002), http:\/\/www.daml.org"},{"key":"26_CR3","unstructured":"Kopena, J.: DAMLJessKB, http:\/\/plan.mcs.drexel.edu\/projects\/legorobots\/design\/software\/DAMLJessKB\/"},{"key":"26_CR4","unstructured":"Dean, M., Barber, K.: DAML Crawler, http:\/\/www.daml.org\/crawler\/"},{"key":"26_CR5","unstructured":"Kalyanpur, A., Hendler, J.: RDF Web Scraper Version 1.1. (2002), http:\/\/www.ece.umd.edu\/adityak\/running.html"},{"key":"26_CR6","unstructured":"Kogut, P., Holmes, W.: AeroDAML: Applying Information Extraction to Generate DAML Annotations from Web Pages. In: First International Conference on Knowledge Capture (K-CAP 2001) Workshop on Knowledge Markup and Semantic Annotation, Victoria (2001)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Reagle, J., Solo, D.: XML-Signature Syntax and Processing. RFC 3275 (March 2002)","DOI":"10.17487\/rfc3075"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Reagle, J.: XML Encryption Syntax and Processing. W3C Candidate Recommendation (August 2002)","DOI":"10.17487\/rfc3075"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile. RFC 3280 (April 2002)","DOI":"10.17487\/rfc3280"},{"key":"26_CR10","unstructured":"W3C: Extensible Markup Language. W3C Recommendation, http:\/\/www.w3c.org\/XML\/"},{"key":"26_CR11","unstructured":"Godik, S., Moses, T.: Oasis extensible access control markup language (xacml). OASIS Committee Secification cs-xacml-specification-1.0 (November 2002)"},{"key":"26_CR12","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: Platform for privacy preferences (p3p) (2002)"},{"key":"26_CR13","unstructured":"Ferraiolo, D., Kuhn, R.: Role-based access controls. In: 15th NIST-NCSC National Computer Security Conference, pp. 554\u2013563 (1992)"},{"key":"26_CR14","unstructured":"Guiri, L.: A new model for role-based access control (1995)"},{"key":"26_CR15","volume-title":"Advances in Computers","author":"R.S. Sandhu","year":"1998","unstructured":"Sandhu, R.S.: Role-based access control. In: Zerkowitz, M. (ed.) Advances in Computers, vol.\u00a048. Academic Press, London (1998)"},{"key":"26_CR16","unstructured":"Yialelis, N., Lupu, E., Sloman, M.: Role-based security for distributed object systems (1996)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Barka, E., Sandhu, R.: Framework for role-based delegation models. In: Annual Computer Security Applications Conference (2000)","DOI":"10.1109\/ACSAC.2000.898870"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure : Or assigning roles to strangers. In: 2000 IEEE Symposium on Security and Privacy, Oakland (May 2000)","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Hildmann, T., Barholdt, J.: Managing trust between collaborating companies using outsourced role based access control. In: Fourth ACM workshop on Role-based access control, Fairfax, Virginia, United States (1999)","DOI":"10.1145\/319171.319181"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The keynote trust management system version (1999)","DOI":"10.17487\/rfc2704"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Keromytis, A., Ioannidis, S., Greenwald, M., Smith, J.: The strongman architecture. In: Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C, April 22\u201324 (2003)","DOI":"10.1109\/DISCEX.2003.1194883"},{"key":"26_CR22","unstructured":"Undercoffer, J., Perich, F., Cedilnik, A., Kagal, L., Joshi, A., Finin, T.: A Secure Infrastructure for Service Discovery and Management in Pervasive Computing. The Journal of Special Issues on Mobility of Systems, Users, Data and Computing (2003)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T., Joshi, A.: Trust based security for pervasive computing enviroments. IEEE Communications (December 2001)","DOI":"10.1109\/2.970591"},{"key":"26_CR24","unstructured":"Kagal, L., Finin, T., Peng, Y.: A Framework for Distributed Trust Management. In: Proceedings of IJCAI 2001 Workshop on Autonomy, Delegation and Control (2001)"},{"key":"26_CR25","unstructured":"W3C: Resource Description Framework. W3C Recommendation (2002), http:\/\/www.w3.org\/TR\/rdf-schema\/"},{"key":"26_CR26","unstructured":"Swedish Institute, S.I.o.C.S.: SICStus Prolog (2001), http:\/\/www.sics.se\/sicstus\/"},{"key":"26_CR27","unstructured":"Kagal, L., Finin, T., Joshi, A.: A policy language for pervasive systems. In: Fourth IEEE International Workshop on Policies for Distributed Systems and Networks (2003)"},{"key":"26_CR28","unstructured":"Moffett, J., Sloman, M.: Policy conflict analysis in distributed systems management. Journal of Organizational Computing (1993)"},{"key":"26_CR29","unstructured":"Berners-Lee, T.: Notation 3 (2001), http:\/\/www.w3.org\/DesignIssues\/Notation3"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Lupu, E.C., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering (1999)","DOI":"10.1109\/32.824414"},{"key":"26_CR31","unstructured":"Denker, G.: Access control and data integrity for daml+oil and daml-s. White paper (2002)"},{"key":"26_CR32","unstructured":"Chodhari, A., Kagal, L., Joshi, A., Finin, T., Yesha, Y.: Patientservice: A policy based information service for ehealthcare. In: Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry, Santa Monica (June 2003)"},{"key":"26_CR33","unstructured":"FIPA: FIPA Agent Management Specification. In: FIPA website (2001), http:\/\/www.fipa.org\/specs\/fipa00023\/"},{"key":"26_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-48005-6_26","volume-title":"The Semantic Web - ISWC 2002","author":"M. Paolucci","year":"2002","unstructured":"Paolucci, M., Kawamura, T., Payne, T.R., Sycara, K.: Semantic matching of web services capabilities. In: Horrocks, I., Hendler, J. (eds.) ISWC 2002. LNCS, vol.\u00a02342, p. 333. Springer, Heidelberg (2002)"},{"key":"26_CR35","unstructured":"Ingersoll Rand (Woodcliff Lake, NJ) and QAD (Carpenteria, CA) and Berclain Group (Schaumburg, IL) and IBM Corporation (Somers, NY): CIIMPLEX Consortium, Consortium for Integrated Intelligent Manufacturing PLanning and EXecution (2000), http:\/\/www.ciimplex.org"},{"key":"26_CR36","unstructured":"Kagal, L., Finin, T., Joshi, A.: Developing secure agent systems using delegation based trust management. In: Security of Mobile MultiAgent Systems held at Autonomous Agents and MultiAgent Systems (2002)"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web - ISWC 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39718-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T09:26:15Z","timestamp":1559553975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39718-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540203629","9783540397182"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39718-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}