{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:40:50Z","timestamp":1725489650445},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748090"},{"type":"electronic","value":"9783540748106"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74810-6_9","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T01:44:24Z","timestamp":1187315064000},"page":"246-281","source":"Crossref","is-referenced-by-count":12,"title":["An Introduction to the Role Based Trust Management Framework RT"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Czenko","sequence":"first","affiliation":[]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[]},{"given":"Dongyi","family":"Li","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Winsborough","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","first-page":"6007","volume-title":"Proc. 33rd Hawaii International Conference on System Sciences","author":"A. Abdul-Rahman","year":"2000","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proc. 33rd Hawaii International Conference on System Sciences, vol.\u00a06, p. 6007. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"9_CR2","unstructured":"ANSI: American National Standard for Information Technology \u2013 Role Based Access Control. ANSI INCITS 359-2004 (February 2004)"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/319709.319718","volume-title":"CCS 1999: Proc. 6th ACM Conference on Computer and Communications Security","author":"A.W. Appel","year":"1999","unstructured":"Appel, A.W., Felten, E.W.: Proof-Carrying Authentication. In: CCS 1999: Proc. 6th ACM Conference on Computer and Communications Security, pp. 52\u201362. ACM Press, New York (1999)"},{"key":"9_CR4","unstructured":"Bauer, L., Schneider, M.A., Felten, E.W.: A General and Flexible Access-Control System for the Web. In: Proc. 11th USENIX Security Symposium, USENIX Association, pp. 93\u2013108 (2002)"},{"key":"9_CR5","unstructured":"Bauer, L.: Access Control for the Web via Proof-Carrying Authorization. PhD thesis, Adviser-Andrew W. Appel. (2003)"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/POLICY.2004.1309162","volume-title":"Proc. 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004)","author":"M.Y. Becker","year":"2004","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Distributed Access Control Policies with Tunable Expressiveness. In: Proc. 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), pp. 159\u2013168. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"9_CR7","first-page":"139","volume-title":"CSFW","author":"M.Y. Becker","year":"2004","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management, Applied to Electronic Health Records. In: CSFW, pp. 139\u2013154. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System, Version 2. IETF RFC 2704 (1999)","DOI":"10.17487\/rfc2704"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 185\u2013210. Springer, Heidelberg (1999)"},{"key":"9_CR10","first-page":"164","volume-title":"Proc. 17th IEEE Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. 17th IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"9_CR11","unstructured":"Bonatti, P., Duma, C., Olemdilla, D., Shahmehri, N.: An Integration of Reputation-based and Policy-based Trust Management. In: Proc. Semantic Web and Policy Workshop (2005)"},{"issue":"4","key":"9_CR12","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D. Clarke","year":"2001","unstructured":"Clarke, D., Elien, J.E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate Chain Discovery in SPKI\/SDSI. Journal of Computer Security\u00a09(4), 285\u2013322 (2001)","journal-title":"Journal of Computer Security"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/501158.501177","volume-title":"Proc. 3rd ACM conference on Electronic Commerce","author":"C. Dellarocas","year":"2001","unstructured":"Dellarocas, C.: Analyzing the Economic Efficiency of eBay-like Online Reputation Reporting Mechanisms. In: Proc. 3rd ACM conference on Electronic Commerce, pp. 171\u2013179. ACM Press, New York (2001)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"9_CR15","volume-title":"Proc. 12th ACM Symposium on Access Control Models and Technologies","author":"S. Etalle","year":"2007","unstructured":"Etalle, S., Winsborough, W.H.: A Posteriori Compliance Control. In: Proc. 12th ACM Symposium on Access Control Models and Technologies, ACM Press, New York (2007)"},{"issue":"15","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1002\/1097-024X(200012)30:15<1609::AID-SPE334>3.0.CO;2-5","volume":"30","author":"C. Gunter","year":"2000","unstructured":"Gunter, C., Jim, T.: Policy-directed Certificate Retrieval. Software: Practice & Experience\u00a030(15), 1609\u20131640 (2000)","journal-title":"Software: Practice & Experience"},{"key":"9_CR17","first-page":"2","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"A. Herzberg","year":"2000","unstructured":"Herzberg, A., Mass, Y., Michaeli, J., Ravid, Y., Naor, D.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In: Proc. IEEE Symposium on Security and Privacy, pp. 2\u201314. IEEE Computer Society Press, Los Alamitos (2000)"},{"issue":"1-2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1019104520776","volume":"1","author":"S.L. Jarvenpaa","year":"2000","unstructured":"Jarvenpaa, S.L., Tractinsky, N., Vitale, M.: Consumer Trust in an Internet Store. Inf. Tech. and Management\u00a01(1-2), 45\u201371 (2000)","journal-title":"Inf. Tech. and Management"},{"key":"9_CR19","first-page":"106","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"T. Jim","year":"2001","unstructured":"Jim, T.: SD3: A Trust Management System with Certified Evaluation. In: Proc. IEEE Symposium on Security and Privacy, pp. 106\u2013115. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/304851.304877","volume-title":"NSPW 1996: Proc. Workshop on New Security Paradigms","author":"A. J\u00f8sang","year":"1996","unstructured":"J\u00f8sang, A.: The Right Type of Trust for Distributed Systems. In: NSPW 1996: Proc. Workshop on New Security Paradigms, pp. 119\u2013131. ACM Press, New York (1996)"},{"key":"9_CR21","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1145\/775152.775242","volume-title":"Proc. 12th International Conference on World Wide Web","author":"S.D. Kamvar","year":"2003","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proc. 12th International Conference on World Wide Web, pp. 640\u2013651. ACM Press, New York (2003)"},{"key":"9_CR22","first-page":"162","volume-title":"Proc. 1999 IEEE Computer Security Foundations Workshop","author":"N. Li","year":"1999","unstructured":"Li, N., Feigenbaum, J., Grosof, B.N.: A Logic-based Knowledge Representation for Authorization with Delegation (Extended Abstract). In: Proc. 1999 IEEE Computer Security Foundations Workshop, pp. 162\u2013174. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"9_CR23","first-page":"201","volume-title":"Proc. 3rd DARPA Information Survivability Conference and Exposition (DISCEX III)","author":"N. Li","year":"2003","unstructured":"Li, N., Mitchell, J.: RT: A Role-based Trust-management Framework. In: Proc. 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), pp. 201\u2013212. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"9_CR24","first-page":"114","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of a Role-based Trust-management Framework. In: Proc. IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"1","key":"9_CR25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security\u00a011(1), 35\u201386 (2003)","journal-title":"Journal of Computer Security"},{"key":"9_CR26","first-page":"101","volume-title":"Proc. 1st International Workshop on Security and Trust Management","author":"M. Czenko","year":"2005","unstructured":"Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P., den Hartog, J.: Nonmonotonic Trust Management for P2P Applications. In: Proc. 1st International Workshop on Security and Trust Management, pp. 101\u2013116. Elsevier, Amsterdam (2005)"},{"key":"9_CR27","first-page":"188","volume":"07","author":"L. Mui","year":"2002","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation for E-businesses. Hicss\u00a007, 188 (2002)","journal-title":"Hicss"},{"issue":"12","key":"9_CR28","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM\u00a043(12), 45\u201348 (2000)","journal-title":"Commun. ACM"},{"key":"9_CR29","unstructured":"Rivest, R., Lampson, B.: SDSI \u2013 A Simple Distributed Security Infrastructure (October 1996), Available at http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi11.html"},{"issue":"1","key":"9_CR30","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-2005-13107","volume":"13","author":"V. Shmatikov","year":"2005","unstructured":"Shmatikov, V., Talcott, C.L.: Reputation-based Trust Management. Journal of Computer Security\u00a013(1), 167\u2013190 (2005)","journal-title":"Journal of Computer Security"},{"key":"9_CR31","first-page":"94","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"S. Weeks","year":"2001","unstructured":"Weeks, S.: Understanding Trust Management Systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 94\u2013105. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"9_CR32","first-page":"92","volume-title":"POLICY","author":"W.H. Winsborough","year":"2002","unstructured":"Winsborough, W.H., Li, N.: Towards Practical Automated Trust Negotiation. In: POLICY, pp. 92\u2013103. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"9_CR33","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/779928.779972","volume-title":"ACM Conference on Electronic Commerce","author":"L. Xiong","year":"2003","unstructured":"Xiong, L., Liu, L.: A Reputation-based Trust Model for Peer-to-Peer eCommerce Communities. In: ACM Conference on Electronic Commerce, pp. 228\u2013229. ACM, New York (2003)"},{"issue":"7","key":"9_CR34","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Trans. Knowl. Data Eng.\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9_CR35","volume-title":"RSP: IEEE Computer Society Symposium on Research in Security and Privacy","author":"R. Yahalom","year":"1993","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust Relationships in Secure Systems \u2013 A Distributed Authentication Perspective. In: RSP: IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society, Los Alamitos (1993)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74810-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,21]],"date-time":"2021-08-21T19:21:51Z","timestamp":1629573711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74810-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748090","9783540748106"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74810-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}