{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:20:09Z","timestamp":1725542409812},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642111600"},{"type":"electronic","value":"9783642111617"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-11161-7_16","type":"book-chapter","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T21:17:29Z","timestamp":1260825449000},"page":"229-244","source":"Crossref","is-referenced-by-count":3,"title":["Memory Complexity of Automated Trust Negotiation Strategies"],"prefix":"10.1007","author":[{"given":"Indika H.","family":"Katugampala","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hirofumi","family":"Yamaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yukiko","family":"Yamaguchi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","first-page":"88","volume-title":"DARPA Information Survivability Conference and Exposition","author":"W.H. Winsborough","year":"2000","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, vol.\u00a0I, pp. 88\u2013102. IEEE Press, Los Alamitos (2000)"},{"key":"16_CR2","unstructured":"Winsborough, W.H., Jones, V.E.: Negotiating disclosure of sensitive credentials (1999)"},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security\u00a06, 1\u201342 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/POLICY.2002.1011297","volume-title":"Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks","author":"W.H. Winsborough","year":"2002","unstructured":"Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks, pp. 92\u2013103. IEEE Computer Society, Los Alamitos (2002)"},{"issue":"6","key":"16_CR5","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M. Winslett","year":"2002","unstructured":"Winslett, M., Yu, T., Seamons, K., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust in the web. IEEE Internet Computing\u00a06(6), 30\u201337 (2002)","journal-title":"IEEE Internet Computing"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Yu, T., Ma, X., Winslett, M.: Prunes: An efficient and complete strategy for automated trust negotiation over the internet (2000)","DOI":"10.1145\/352600.352633"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/501983.502004","volume-title":"Proceedings of the 8th ACM conference on Computer and Communications Security","author":"T. Yu","year":"2001","unstructured":"Yu, T.: Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 146\u2013155. ACM Press, New York (2001)"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/POLICY.2007.29","volume-title":"Eighth International Workshop on Policies for Distributed Systems and Networks","author":"S. Baselice","year":"2007","unstructured":"Baselice, S., Bonatti, P.A., Faella, M.: On interoperable trust negotiation strategies. In: Eighth International Workshop on Policies for Distributed Systems and Networks, pp. 39\u201350. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Yamaki, H., Fujii, M., Nakatsuka, K., Ishida, T.: A dynamic programming approach to automated trust negotiation for multiagent systems. In: Rational, Robust, and Secure Negotiation Mechanisms in Multi-Agent Systems, pp. 55\u201366 (2005)","DOI":"10.1109\/RRS.2005.2"},{"key":"16_CR10","unstructured":"Yamaki, H., Furuta, T., Katugampala, I.: Platforms for evaluating automated trust negotiation protocols and strategies (2008)"}],"container-title":["Lecture Notes in Computer Science","Principles of Practice in Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11161-7_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:37:51Z","timestamp":1606185471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11161-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642111600","9783642111617"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11161-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}