{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:19:25Z","timestamp":1737436765323,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749165"},{"type":"electronic","value":"9783540749172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74917-2_22","type":"book-chapter","created":{"date-parts":[[2007,8,24]],"date-time":"2007-08-24T14:51:39Z","timestamp":1187967099000},"page":"272-279","source":"Crossref","is-referenced-by-count":2,"title":["Automated Trust Negotiation in Autonomic Environments"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Klenk","sequence":"first","affiliation":[]},{"given":"Frank","family":"Petri","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Radier","sequence":"additional","affiliation":[]},{"given":"Mikael","family":"Salaun","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"22_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCSE.2004.22","volume":"06","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust Negotiations: Concepts, Systems, and Languages. Computing in Science and Engineering\u00a006(4), 27\u201334 (2004)","journal-title":"Computing in Science and Engineering"},{"issue":"7","key":"22_CR2","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 827\u2013842 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"22_CR3","unstructured":"Bui, H., Venkatesh, S., Kieronska, D.: An architecture for negotiating agents that learn (1995)"},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1147\/sj.421.0107","volume":"42","author":"D.M. Chess","year":"2003","unstructured":"Chess, D.M., Palmer, C., White, S.R.: Security in an autonomic computing environment. IBM Syst. J.\u00a042(1), 107\u2013118 (2003)","journal-title":"IBM Syst. J."},{"key":"22_CR5","unstructured":"Andrieux, A., et al.: Web Services Agreement Negotiation Specification (WS-AgreementNegotiation). Technical report, Global Grid Forum (2007)"},{"key":"22_CR6","unstructured":"Frikken, K.B., Li, J., Atallah, M.J.: Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA. The Internet Society (2006)"},{"issue":"1","key":"22_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1147\/sj.421.0005","volume":"42","author":"A.G. Ganek","year":"2003","unstructured":"Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Syst. J.\u00a042(1), 5\u201318 (2003)","journal-title":"IBM Syst. J."},{"key":"22_CR8","first-page":"92","volume-title":"POLICY 2002","author":"N. Li","year":"2002","unstructured":"Li, N., Winsborough, W.: Towards Practical Automated Trust Negotiation. In: POLICY 2002. Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, p. 92. IEEE Computer Society Press, Washington (2002)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Lopes, F., Mamede, N., Novais, A.Q., Coelho, H.: A negotiation model for autonomous computational agents: Formal description and empirical evaluation (2002)","DOI":"10.1007\/3-540-36131-6_57"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Nejdl, W., Olmedilla, D., Winslett, M.: PeerTrust: automated trust negotiation for peers on the semantic web (2003)","DOI":"10.1007\/978-3-540-30073-1_9"},{"key":"22_CR11","volume-title":"ICDEW 2006","author":"L. Olson","year":"2006","unstructured":"Olson, L., Winslett, M., Tonti, G., Seeley, N., Uszok, A., Bradshaw, J.: Trust Negotiation as an Authorization Service for Web Services. In: ICDEW 2006. Proceedings of the 22nd International Conference on Data Engineering Workshops, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Smith, B., Seamons, K.E., Jones, M.D.: Responding to Policies at Runtime in TrustBuilder. In: POLICY, pp. 149\u2013158 (2004)","DOI":"10.1109\/POLICY.2004.1309161"},{"key":"22_CR13","unstructured":"Winsborough, W., Seamons, K., Jones, V.: Automated Trust Negotiation. Technical report, North Carolina State University at Raleigh, Raleigh, NC, USA (2000)"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/644527.644532","volume-title":"WPES 2002","author":"W.H. Winsborough","year":"2002","unstructured":"Winsborough, W.H., Li, N.: Protecting sensitive attributes in automated trust negotiation. In: WPES 2002. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pp. 41\u201351. ACM Press, New York (2002)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Yamaki, H., Fujii, M., Nakatsuka, K., Ishida, T.: A Dynamic Programming Approach to Automated Trust Negotiation for Multiagent Systems. rrs, 0:55\u201366 (2005)","DOI":"10.1109\/RRS.2005.2"},{"key":"22_CR16","first-page":"108","volume-title":"P2P 2004","author":"S. Ye","year":"2004","unstructured":"Ye, S., Makedon, F., Ford, J.: Collaborative Automated Trust Negotiation in Peer-to-Peer Systems. In: P2P 2004. Proceedings of the Fourth International Conference on Peer-to-Peer Computing, pp. 108\u2013115. IEEE Computer Society Press, Washington, DC (2004)"},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/501983.502004","volume-title":"CCS 2001","author":"T. Yu","year":"2001","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: CCS 2001. Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 146\u2013155. ACM Press, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Self-Organizing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74917-2_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T16:54:08Z","timestamp":1737392048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74917-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540749165","9783540749172"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74917-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}