{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:04:30Z","timestamp":1742389470223},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692928"},{"type":"electronic","value":"9783540692935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69293-5_3","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:07:43Z","timestamp":1218542863000},"page":"3-19","source":"Crossref","is-referenced-by-count":10,"title":["Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments"],"prefix":"10.1007","author":[{"given":"Stephen S.","family":"Yau","sequence":"first","affiliation":[]},{"given":"Zhaoji","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Xu, F., Lin, G., Huang, H., Xie, L.: Role-based Access Control System for Web Services. In: Proc. 4th Int\u2019l Conf. on Computer and Information Technology, pp. 357\u2013362 (2004)"},{"key":"3_CR2","unstructured":"Bhatt, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Access Control in Dynamic XML-Based Web Services with XRBAC. In: Proc. 1st Int\u2019l Conf. on Web Services (2003), \n                      \n                        http:\/\/www.sis.pitt.edu\/~jjoshi\/ICWS_XRBAC_Final_PDF.pdf"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/11839569_49","volume-title":"Autonomic and Trusted Computing","author":"S.S. Yau","year":"2006","unstructured":"Yau, S.S., Chen, Z.: A Framework for Specifying and Managing Security Requirements in Collaborative Systems. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol.\u00a04158, pp. 500\u2013510. Springer, Heidelberg (2006)"},{"key":"3_CR4","unstructured":"OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS standard (2005), \n                      \n                        http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/3-540-61770-1_37","volume-title":"Computer Security - ESORICS 96","author":"P.A. Bonatti","year":"1996","unstructured":"Bonatti, P.A., Sapino, M.L., Subrahmanian, V.S.: Merging Heterogeneous Security Orderings. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 183\u2013197. Springer, Heidelberg (1996)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/BFb0055855","volume-title":"Computer Security \u2013 ESORICS 98","author":"C. Bidan","year":"1998","unstructured":"Bidan, C., Issarny, V.: Dealing with Multi-policy Security in Large Open Distributed Systems. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 51\u201366. Springer, Heidelberg (1998)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-540-30108-0_3","volume-title":"Computer Security \u2013 ESORICS 2004","author":"M. Backes","year":"2004","unstructured":"Backes, M., Durmuth, M., Steinwandt, R.: An Algebra for Computing Enterprise Privacy Policies. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 33\u201352. Springer, Heidelberg (2004)"},{"key":"3_CR8","unstructured":"Ribeiro, C., Zuquete, A., Ferreira, P.: SPL: An access control language for security policies with complex constraints. In: Proc. Network and Distributed System Security Symp (NDSS 2001), pp. 89\u2013107 (2001)"},{"issue":"6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E. Lupu","year":"1999","unstructured":"Lupu, E., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Trans. on Software Engineering\u00a025(6), 852\u2013869 (1999)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Giles, J., Lee, K.W., Lobo, J.: Policy ratification. In: Proc. 6th IEEE Int\u2019l Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 223\u2013232 (2005)","DOI":"10.1109\/POLICY.2005.25"},{"issue":"9","key":"3_CR11","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1002\/spe.736","volume":"36","author":"S.S. Yau","year":"2006","unstructured":"Yau, S.S., Huang, D., Gong, H., Yao, Y.: Support for Situation-Awareness in Trustworthy Ubiquitous Computing Application Software. J. Software Practice and Engineering\u00a036(9), 893\u2013921 (2006)","journal-title":"J. Software Practice and Engineering"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69293-5_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:33:46Z","timestamp":1620002026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69293-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692928","9783540692935"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69293-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}