{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:21:28Z","timestamp":1739337688245,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033537"},{"type":"electronic","value":"9783642033544"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03354-4_22","type":"book-chapter","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T06:46:56Z","timestamp":1248331616000},"page":"287-303","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Conditional Resource Coordination for Successful Collaborations"],"prefix":"10.1007","author":[{"given":"Dongxi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"David","family":"Moreland","sequence":"additional","affiliation":[]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"John","family":"Zic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Nezhad, H.R.M., Benatallah, B., Martens, A., Curbera, F., Casati, F.: Semi-automated adaptation of service interactions. In: WWW 2007: Proceedings of the 16th International Conference on World Wide Web, pp. 993\u20131002 (2007)","DOI":"10.1145\/1242572.1242706"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/SCC.2006.30","volume-title":"SCC 2006: Proceedings of the IEEE International Conference on Services Computing","author":"N. Desai","year":"2006","unstructured":"Desai, N., Chopra, A.K., Singh, M.P.: Business process adaptations via protocols. In: SCC 2006: Proceedings of the IEEE International Conference on Services Computing, pp. 103\u2013110. IEEE Computer Society, Los Alamitos (2006)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"22_CR4","first-page":"114","volume-title":"SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society, Los Alamitos (2002)"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/WETICE.2006.37","volume-title":"WETICE 2006: Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","author":"J. Chan","year":"2006","unstructured":"Chan, J., Rogers, G., Agahari, D., Moreland, D., Zic, J.: Enterprise collaborative contexts and their provisioning for secure managed extranets. In: WETICE 2006: Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 313\u2013318. IEEE Computer Society, Los Alamitos (2006)"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1109\/WETICE.2007.4407196","volume-title":"WETICE 2007: Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","author":"J. Chan","year":"2007","unstructured":"Chan, J., Nepal, S., Moreland, D., Hwang, H., Chen, S., Zic, J.: User-controlled collaborations in the context of trust extended environments. In: WETICE 2007: Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 389\u2013394. IEEE Computer Society, Los Alamitos (2007)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Gong, L., Qian, X.: The complexity and composability of secure interoperation. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, p. 190 (1994)","DOI":"10.1109\/RISP.1994.296581"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Shehab, M., Bertino, E., Ghafoor, A.: Secure collaboration in mediator-free environments. In: CCS 2005: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 58\u201367 (2005)","DOI":"10.1145\/1102120.1102130"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Warner, J., Atluri, V., Mukkamala, R., Vaidya, J.: Using semantics for automatic enforcement of access control policies among dynamic coalitions. In: SACMAT 2007: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 235\u2013244 (2007)","DOI":"10.1145\/1266840.1266877"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: A usage-based authorization framework for collaborative computing systems. In: Proceedings of the eleventh ACM symposium on Access Control Models and Technologies, pp. 180\u2013189 (2006)","DOI":"10.1145\/1133058.1133084"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Bertino, E., Crampton, J., Paci, F.: Access control and authorization constraints for ws-bpel. In: ICWS 2006: Proceedings of the IEEE International Conference on Web Services, pp. 275\u2013284 (2006)","DOI":"10.1109\/ICWS.2006.21"},{"issue":"1","key":"22_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur.\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"22_CR13","first-page":"155","volume-title":"CSFW 2004: Proceedings of the 17th IEEE workshop on Computer Security Foundations","author":"K. Tan","year":"2004","unstructured":"Tan, K., Crampton, J., Gunter, C.A.: The consistency of task-based authorization constraints in workflow systems. In: CSFW 2004: Proceedings of the 17th IEEE workshop on Computer Security Foundations, p. 155. IEEE Computer Society, Los Alamitos (2004)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 147\u2013158 (2005)","DOI":"10.1145\/1063979.1064005"},{"issue":"2","key":"22_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/356586.356588","volume":"3","author":"E.G. Coffman","year":"1971","unstructured":"Coffman, E.G., Elphick, M., Shoshani, A.: System deadlocks. ACM Comput. Surv.\u00a03(2), 67\u201378 (1971)","journal-title":"ACM Comput. Surv."},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T., Winsborough, W.H.: On the modeling and analysis of obligations. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (2006)","DOI":"10.1145\/1180405.1180423"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03354-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T09:46:19Z","timestamp":1739267179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03354-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033537","9783642033544"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03354-4_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}