{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:24:03Z","timestamp":1743125043901,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201854"},{"type":"electronic","value":"9783540451846"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45184-6_12","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:09:02Z","timestamp":1277683742000},"page":"146-157","source":"Crossref","is-referenced-by-count":2,"title":["Trust- $\\mathcal{X}$ : An XML Framework for Trust Negotiations"],"prefix":"10.1007","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Anna Cinzia","family":"Squicciarini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bertino, E., Castano, S., Ferrari, E.: On Specifying Security Policies for Web Documents with an XML-based Language. In: Proc. of SACMAT 2001, ACM Symposium on Access Control Models and Technologies, Fairfax, VA (May 2001)","DOI":"10.1145\/373256.373264"},{"key":"12_CR2","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.: X-TNL - An XML Based language for Trust Negotiations. In: Proceedings of 4th International Workshop on Policies for Distributed Systems and Networks, Como, Italy (June 2003)"},{"key":"12_CR3","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.: Trust-X A Peer to Peer framework for Trust Establishment (submitted for Publication)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust- Management System. RFC 2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Yu, T., Winslett, M., Seamons, K.: Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation. ACM Transactions on Information and System Security\u00a06(1) (February 2003)","DOI":"10.1145\/605434.605435"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Samarati, P.: Regulating Access Services and Information Release on the Web. In: 7th ACM Conference on Computer and Communications Security, Athens, Greece (November 2000)","DOI":"10.1145\/352600.352620"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for Policy Languages for Trust Negotiation. In: International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA (June 2002)","DOI":"10.1109\/POLICY.2002.1011295"},{"key":"12_CR8","unstructured":"Herzberg, A., Mihaeli, Mass, Y., Naor, D., Ravid, Y.: Access Control System Meets Public Infrastructure, Or: Assigning roles to Strangers. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2000)"},{"key":"12_CR9","unstructured":"World Wide Web Consortium, Available at http:\/\/www.w3.org\/"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security. Advanced Techniques for Network and Data Protection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45184-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:38:04Z","timestamp":1559209084000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45184-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201854","9783540451846"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45184-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}