{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:50:21Z","timestamp":1725501021824},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744085"},{"type":"electronic","value":"9783540744092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74409-2_3","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T11:57:55Z","timestamp":1187351875000},"page":"3-13","source":"Crossref","is-referenced-by-count":2,"title":["Recognition of Authority in Virtual Organisations"],"prefix":"10.1007","author":[{"given":"Tuan-Anh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"David","family":"Chadwick","sequence":"additional","affiliation":[]},{"given":"Bassem","family":"Nasser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","volume-title":"Proceedings of 7th ACM Symoisium on Access Control Models and Technologies (SACMAT 2002)","author":"D. Chadwick","year":"2002","unstructured":"Chadwick, D., Otenko, S.: The permis x.509 role based privilege management infrastructure. In: Proceedings of 7th ACM Symoisium on Access Control Models and Technologies (SACMAT 2002), ACM Press, New York (2002)"},{"key":"3_CR2","unstructured":"Chadwick, D., Zhao, G., Otenko, S., Laborde, R., Su, L., Nguyen, T.A.: Building a modular authorization infrastructure. In: Fifth All Hands Meeting. UK e-science, Achievements, Challenges & New Opportunities (September 2006)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W, Otenko, S., Nguyen, T.A.: Adding support to xacml for dynamic delegation of authority in multiple domains. In: 10th IFIP Open Conference on Communications and Multimedia Security, Heraklion Crete (2006)","DOI":"10.1007\/11909033_7"},{"key":"3_CR4","unstructured":"Erdos, M., Cantor, S.: Shibboleth-architecture draft v05. Technical report, Internet2 (May 2002)"},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"3_CR6","unstructured":"Firozabadi, B.S., Olsson, O., Rissanen, E.: Managing authorisations in dynamic coalitions. Swedish Institute of Computer Science (2003)"},{"key":"3_CR7","unstructured":"Kagal, L., Finin, T., Peng, Y.: A delegation based model for distributed trust. In: Proceedings of the IJCAI01 Workshop on Autonomy, Delegation and Control: Interacting with Autonomous Agent, Seattle, pp. 73\u201380 (2001)"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/373256.373266","volume-title":"The sixth ACM symposium on Access control models and technologies","author":"M.H. Kang","year":"2001","unstructured":"Kang, M.H., Park, J.S., Froscher, J.N.: Access control mechanisms for inter-organizational workflow. In: The sixth ACM symposium on Access control models and technologies, Chantilly, Virginia, United States, pp. 66\u201374. ACM Press, New York (2001)"},{"key":"3_CR9","first-page":"114","volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Distributed credential chain discovery in trust management. Journal of Computer Security, 35\u201386 (2003)","DOI":"10.3233\/JCS-2003-11102"},{"issue":"9","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/49.257932","volume":"11","author":"J.D. Moffett","year":"1993","unstructured":"Moffett, J.D., Sloman, M.S.: Policy hierarchies for distributed systems management. IEEE Journal on Selected Areas in Communications\u00a011(9), 1404\u20131414 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/11805588_15","volume-title":"Data and Applications Security XX","author":"R. Mukkamala","year":"2006","unstructured":"Mukkamala, R., Atluri, V., Warner, J., Abbadasari, R.: A distributed coalition service registry for ad-hoc dynamic coalitions: A service-oriented approach. In: Damiani, E., Liu, P. (eds.) Data and Applications Security XX. LNCS, vol.\u00a04127, pp. 209\u2013223. Springer, Heidelberg (2006)"},{"key":"3_CR13","volume-title":"Proceedings of The IEEE Ubisafe 2007","author":"T.-A. Nguyen","year":"2007","unstructured":"Nguyen, T.-A., Su, L., Inman, G., Chadwick, D.: Flexible and manageable delegation of authority in rbac. In: Proceedings of The IEEE Ubisafe 2007, Ontario, Canada, 21-23 May 2007, IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"3_CR14","volume-title":"ACM SACMAT 2004","author":"J.S. Park","year":"2004","unstructured":"Park, J.S., Costello, K.P., Neven, T.M., Diosomito, J.A.: A composite rbac approach for large, complex organizations. In: ACM SACMAT 2004, Yorktown Heights, New York, ACM Press, New York (2004)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: Community authorization service for group collaboration. In: IEEE 3rd International Workshop on Policies for Distributed Systems and Networks (2002)","DOI":"10.1109\/POLICY.2002.1011293"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/300830.300839","volume":"2","author":"R. Sandhu","year":"1999","unstructured":"Sandhu, R., Bhamidipati, V., Munawer, Q.: The arbac97 model for role-based administration of roles. ACM Transactions on Information and System Security\u00a02(1), 105\u2013135 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models, 29(2), 38\u201347 (1996)","DOI":"10.1109\/2.485845"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74409-2_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:25:19Z","timestamp":1619504719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74409-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744085","9783540744092"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74409-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}