{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:47:34Z","timestamp":1759092454246},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_12","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:43:27Z","timestamp":1244241807000},"page":"176-195","source":"Crossref","is-referenced-by-count":16,"title":["TrustBuilder2: A Reconfigurable Framework for Trust Negotiation"],"prefix":"10.1007","author":[{"given":"Adam J.","family":"Lee","sequence":"first","affiliation":[]},{"given":"Marianne","family":"Winslett","sequence":"additional","affiliation":[]},{"given":"Kenneth J.","family":"Perano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Distributed access control policies with tunable expressiveness. In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), pp. 159\u2013168 (2004)","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: X -TNL: An XML-based language for trust negotiations. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003) (2003)","DOI":"10.1109\/POLICY.2003.1206960"},{"issue":"7","key":"12_CR3","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 827\u2013842 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Samarati, P.: Regulating service access and information release on the web. In: 7th ACM Conference on Computer and Communications Security, pp. 134\u2013143 (2000)","DOI":"10.1145\/352600.352620"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: Proceedings of the Sixth IEEE Workshop on Policies for Distributed Systems and Networks (POLICY 2005), June 2005, pp. 14\u201323 (2005)","DOI":"10.1109\/POLICY.2005.13"},{"key":"12_CR6","unstructured":"Cantor, S., Kemp, J., Philpott, R., Maler, E. (eds.): Assertions and protocols for the OASIS security assertion markup language (SAML V2.0). OASIS Standard (March 2005), http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"De Coi, J.L., Olmedilla, D.: A flexible policy-driven trust negotiation model. In: Proceedings of the IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, November 2007, pp. 450\u2013453 (2007)","DOI":"10.1109\/IAT.2007.21"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Mass, Y., Michaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: assigning roles to strangers. In: IEEE Symposium on Security and Privacy (May 2000)","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"12_CR9","unstructured":"Hess, A., Jacobson, J., Mills, H., Wamsley, R., Seamons, K.E., Smith, B.: Advanced client\/server authentication in TLS. In: Network and Distributed Systems Security Symposium (February 2002)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Housely, R., Ford, W., Polk, T., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF Request for Comments RFC-2459 (January 1999)","DOI":"10.17487\/rfc2459"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Koshutanski, H., Massacci, F.: Interactive access control for web services. In: 19th IFIP Information Security Conference (SEC), August 2004, pp. 151\u2013166 (2004)","DOI":"10.1007\/1-4020-8143-X_10"},{"key":"12_CR12","unstructured":"Koshutanski, H., Massacci, F.: An interactive trust management and negotiation scheme. In: 2nd International Workshop on Formal Aspects in Security and Trust (FAST), August 2004, pp. 139\u2013152 (2004)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/11429760_18","volume-title":"Trust Management","author":"H. Koshutanski","year":"2005","unstructured":"Koshutanski, H., Massacci, F.: Interactive credential negotiation for stateful business processes. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 256\u2013272. Springer, Heidelberg (2005)"},{"key":"12_CR14","unstructured":"Lee, A.J.: Towards Practical and Secure Decentralized Attribute-Based Authorization Systems. PhD thesis, University of Illinois at Urbana-Champaign (July 2008)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Lee, A.J., Winslett, M.: Towards and efficient and language-agnostic compliance checker for trust negotiation systems. In: 3rd ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2008) (March 2008)","DOI":"10.1145\/1368310.1368343"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Lee, A.J., Winslett, M., Basney, J., Von Welch: The Traust authorization service. ACM Transactions on Information and System Security\u00a011(1) (February 2008)","DOI":"10.1145\/1330295.1330297"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Li, J., Li, N., Wang, X., Yu, T.: Denial of service attacks and defenses in decentralized trust management. In: 2nd International Conference on Security and Privacy in Communication Networks (SecureComm) (August 2006)","DOI":"10.1109\/SECCOMW.2006.359545"},{"key":"12_CR18","unstructured":"Li, N., Mitchell, J.: RT: A role-based trust-management framework. In: 3rd DARPA Information Survivability Conference and Exposition (April 2003)"},{"key":"12_CR19","unstructured":"Moses, T.: XACML 2.0 Core: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard (February 2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-30073-1_9","volume-title":"Secure Data Management","author":"W. Nejdl","year":"2004","unstructured":"Nejdl, W., Olmedilla, D., Winslett, M.: Peertrust: Automated trust negotiation for peers on the semantic web. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2004. LNCS, vol.\u00a03178, pp. 118\u2013132. Springer, Heidelberg (2004)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Novotny, J., Tuecke, S., Von Welch: An online credential repository for the grid: MyProxy. In: 10th International Symposium on High Performance Distributed Computing (HPDC-10) (August 2001)","DOI":"10.1109\/HPDC.2001.945181"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.E.: Adaptive trust negotiation and access control. In: 10th ACM Symposium on Access Control Models and Technologies (June 2005)","DOI":"10.1145\/1063979.1064004"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Smith, B., Seamons, K.E., Jones, M.D.: Responding to policies at runtime in TrustBuilder. In: 5th International Workshop on Policies for Distributed Systems and Networks (POLICY 2004) (June 2004)","DOI":"10.1109\/POLICY.2004.1309161"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"van der Horst, T.W., Seamons, K.E.: Short paper: Thor \u2014 the hybrid online repository. In: 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (September 2005)","DOI":"10.1109\/SECURECOMM.2005.49"},{"key":"12_CR25","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition (January 2000)"},{"issue":"6","key":"12_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M. Winslett","year":"2002","unstructured":"Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust on the web. IEEE Internet Computing\u00a06(6), 30\u201337 (2002)","journal-title":"IEEE Internet Computing"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Winslett, M., Zhang, C., Bonatti, P.A.: PeerAccess: A logic for distributed authorization. In: 12th ACM Conference on Computer and Communications Security (CCS 2005) (November 2005)","DOI":"10.1145\/1102120.1102144"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security\u00a06(1) (February 2003)","DOI":"10.1145\/605434.605435"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T18:05:35Z","timestamp":1558375535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}