{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:30:55Z","timestamp":1737610255042,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768357"},{"type":"electronic","value":"9783540768432"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-76843-2_11","type":"book-chapter","created":{"date-parts":[[2007,11,21]],"date-time":"2007-11-21T01:07:44Z","timestamp":1195607264000},"page":"1296-1303","source":"Crossref","is-referenced-by-count":1,"title":["A Policy Based Approach to Managing Shared Data in Dynamic Collaborations"],"prefix":"10.1007","author":[{"given":"Surya","family":"Nepal","sequence":"first","affiliation":[]},{"given":"John","family":"Zic","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Jang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"11_CR1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4018\/jhisi.2007010102","volume":"2","author":"S. Nepal","year":"2007","unstructured":"Nepal, S., Zic, J., Kraehenbuehl, G., Jaccard, F.: A trusted system for sharing patient electronic records in autonomous distributed healthcare systems. International Journal of Healthcare Information Systems and Informatics\u00a02(1), 14\u201334 (2007)","journal-title":"International Journal of Healthcare Information Systems and Informatics"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Phillips Jr., C.E., Ting, T.C., Demurjian, S.A.: Information sharing and security in dynamic coalitions. In: ACM symposium on Access control models and technologies, USA, pp. 87\u201396","DOI":"10.1145\/507711.507726"},{"key":"11_CR3","unstructured":"Khurana, H., Gligor, V.D.: A Model for Access Negotiations in Dynamic Coalitions. In: WETICE, pp. 205\u2013210 (2004)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Freudenthal, E., Pesin, T., Keenan, E., Port, L., Karamcheti, V.: dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. In: International Conference on Distributed Computing Systems (ICDCS) (2002)","DOI":"10.21236\/ADA440599"},{"key":"11_CR5","unstructured":"Patz, G., Condell, M., Krishnan, R., Sanchez, L.: Multidimensional Security Policy Management for Dynamic Coalitions. In: DARPA Information Survivability Conference and Exposition (2001)"},{"issue":"2","key":"11_CR6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"20","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a020(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"11_CR7","unstructured":"Perlman, R.: The Ephemerizer: Making Data Disappear. Sun Microsystems Technical Report SMLI TR-2005-140 (February 2005)"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys\u00a035(3), 309\u2013329 (2003)","journal-title":"ACM Computing Surveys"},{"key":"11_CR9","unstructured":"XACML, http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"11_CR10","unstructured":"EPAL, http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Yianilos, P.N., Sobti, S.: The Evolving Field of Distributed Storage. IEEE Internet Computing, 35\u201339 (2001)","DOI":"10.1109\/4236.957893"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Druschel, P., Rowstron, A.: PAST: A large-scale, persistent peer-to-peer storage utility, HotOS VIII, Schoss Elmau, Germany (May 2001)","DOI":"10.1145\/502051.502053"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Nepal, S., Chan, J., Chen, S., Moreland, D., Zic, J.: An Infrastructure Virtualisation SOA for VNO-based Business Models IEEE SCC, pp.44\u201351 (2007)","DOI":"10.1109\/SCC.2007.26"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Chen, S., Nepal, S., Chan, J., Moreland, D., Zic, J.: Virtual Storage Services for Dynamic Coalitions. In: WETICE 2007, Paris France (2007)","DOI":"10.1109\/WETICE.2007.4407150"},{"key":"11_CR15","unstructured":"SecPAL, http:\/\/research.microsoft.com\/projects\/secpal\/"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76843-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T18:49:44Z","timestamp":1737571784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76843-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540768357","9783540768432"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76843-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}