{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:32:30Z","timestamp":1725496350573},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_7","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T17:19:26Z","timestamp":1196097566000},"page":"69-81","source":"Crossref","is-referenced-by-count":3,"title":["Obligations for Privacy and Confidentiality in Distributed Transactions"],"prefix":"10.1007","author":[{"given":"U. M.","family":"Mbanaso","sequence":"first","affiliation":[]},{"given":"G. S.","family":"Cooper","sequence":"additional","affiliation":[]},{"given":"David","family":"Chadwick","sequence":"additional","affiliation":[]},{"given":"Anne","family":"Anderson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"27","volume-title":"Trust Negotiations: Concepts, Systems and Languages","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.: Trust Negotiations: Concepts, Systems and Languages, pp. 27\u201334. IEEE Computer, Los Alamitos (2004)"},{"key":"7_CR2","unstructured":"W3C: The Platform for Privacy Preferences 1.0 (P3P 1.0). Technical Report (2002)"},{"key":"7_CR3","unstructured":"Langheinrich, E.Z.M.: A P3P Preference Exchange Language 1.0 (APPEL1.0). W3C (April 5, 2002)"},{"key":"7_CR4","unstructured":"OECD: Fair Information Practice. In The Electronic Marketplace A Report To Congress (May 2000), http:\/\/www.ftc.gov\/reports\/privacy2000\/privacy2000.pdf"},{"key":"7_CR5","unstructured":"W3C: Platform for Privacy Preferences (P3P) (2004)"},{"key":"7_CR6","unstructured":"Cantor, S.: Shibboleth Architecture. Internet2 Middleware (2005), http:\/\/shibboleth.internet2.edu\/shibboleth-documents.html"},{"key":"7_CR7","unstructured":"Cantor, S., Kemp, J., Philpott, R., Maler, E.: Security Assertion Markup Language (SAML) V2.0 (March 2005), http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf"},{"key":"7_CR8","unstructured":"Seamons, K.E., Ryutov, T., Zhou, L., Neuman, C., Leithead, T.: Adaptive Trust Negotiation and Access Control. In: 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden (2005)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Li, N.: Towards Practical Automated Trust Negotiation. In: Policy 2002. Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (2002)","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting Privacy during On-line Trust Negotiation. In: 2nd Workshop on Privacy Enhancing Technologies, San Francisco, CA (2002)","DOI":"10.1007\/3-540-36467-6_10"},{"key":"7_CR11","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Negotiating Disclosure of Sensitive Credentials. In: 2nd Conference on Security in Communication Networks, Amlfi, Italy (1999)"},{"key":"7_CR12","unstructured":"Bertino, E.F.E., Squicciarini, A.: TNL: An XML-based Language for Trust Negotiations. In: IEEE 4th International Workshop on policies for Distributed Systems and Networks, Lake Como Italy (2003)"},{"key":"7_CR13","unstructured":"Pau, L.-F.: Privacy Negotiation and Implications on Implementations. In: W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement (2006)"},{"key":"7_CR14","unstructured":"Preibusch, S.: Privacy Negotiations with P3P. In: W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement (2006)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Spantzel, A.B., Squicciarini, A.C., Bertino, E.: Trust Negotiation in Identity Management. IEEE Security & Privacy, 55\u201363 (2007)","DOI":"10.1109\/MSP.2007.46"},{"key":"7_CR16","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard (February 1, 2005)"},{"key":"7_CR17","unstructured":"Anderson, A.: Web Services Profile of XACML (WS-XACML) Version 1.0, WD 8. OASIS XACML Technical Committee (December 12, 2006)"},{"key":"7_CR18","unstructured":"University of Salford: Schema for Obligation of Trust (OoT) (December 2006), http:\/\/infosec.salford.ac.uk\/names\/oot\/ootSchema\/"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Mbanaso, U., Cooper, G.S., Chadwick, D.W., Proctor, S.: Privacy Preserving Trust Authorization using XACML. In: TSPUC 2006. Second International Workshop on Trust, Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo-NY (2006)","DOI":"10.1109\/WOWMOM.2006.92"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:58:55Z","timestamp":1619521135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_7","relation":{},"subject":[]}}