{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:38:49Z","timestamp":1725500329396},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_20","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T15:23:47Z","timestamp":1199805827000},"page":"277-290","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk"],"prefix":"10.1007","author":[{"given":"Zhuo","family":"Tang","sequence":"first","affiliation":[]},{"given":"Ruixuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhengding","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhumu","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/506106.506113","volume":"34","author":"M. Sonntag","year":"2000","unstructured":"Sonntag, M., Hrmanseder, R.: Mobile agent security based on payment. Operating Systems Review\u00a034(4), 48\u201355 (2000)","journal-title":"Operating Systems Review"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Kwok, Y.K., Song, S., Hwang, K.: Selfish grid computing: Game-theoretic modeling and nas performance results cardiff. In: CCGrid-2005. Proceedings of the International Symposium on Cluster Computing and the Grid, Cardiff, UK, May, pp. 9\u201312 (2005)","DOI":"10.1109\/CCGRID.2005.1558688"},{"key":"20_CR3","series-title":"Economics of Information Security","volume-title":"IEEE Security and Privacy","year":"2005","unstructured":"IEEE (ed.): IEEE Security and Privacy. Economics of Information Security, vol.\u00a03. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"4","key":"20_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys\u00a03(4), 2\u201316 (2000)","journal-title":"IEEE Communications Surveys"},{"key":"20_CR5","doi-asserted-by":"crossref","first-page":"75","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review\u00a0(20), 75\u201391 (1995)","journal-title":"Academy of Management Review"},{"issue":"6","key":"20_CR6","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1287\/orsc.10.6.791","volume":"10","author":"S.L. Jarvenpaa","year":"1999","unstructured":"Jarvenpaa, S.L., Leidner, D.E.: Communication and trust in global virtual teams. Organization Science\u00a010(6), 791\u2013815 (1999)","journal-title":"Organization Science"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. Computer\u00a029(2) (1996)","DOI":"10.1109\/2.485845"},{"key":"20_CR8","unstructured":"Moyer, M.J., Covington, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: NISSC 2000. 23rd National Information Systems Security Conference, Baltimore, Md, USA (October 2000)"},{"key":"20_CR9","unstructured":"Zhang, G., Parashar, M.: Context-Aware Dynamic Access Control for Pervasive Applications. In: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), Western MultiConference (WMC), San Diego, CA, USA (January 2004)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using Trust and Risk in Role-Based Access Control Policies. In: Proceedings of Symposium on Access Control Models and Technologies (2004)","DOI":"10.1145\/990036.990062"},{"issue":"4","key":"20_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys\u00a03(4), 2\u201316 (2000)","journal-title":"IEEE Communications Surveys"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. IEEE Conference on Security and Privacy. AT&T (May 1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"20_CR13","first-page":"114","volume-title":"2002 IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: 2002 IEEE Symposium on Security and Privacy, pp. 114\u2013131. IEEE, Los Alamitos (2002)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Trust Management","author":"W. Teh-Ming","year":"2003","unstructured":"Teh-Ming, W., Fidelis, Y.: A policy-driven trust management framework. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol.\u00a02692, Springer, Heidelberg (2003)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Dimmock, N., Belokosztolszki, A., Eyers, D., et al.: Using Trust and Risk in Role based Access Control Policies. In: SACMAT 2004, New York, USA, June 2-4, 2004 (2004)","DOI":"10.1145\/990036.990062"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T17:20:23Z","timestamp":1557163223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}